Reducing internet latency: A survey of techniques and their merits

B Briscoe, A Brunstrom, A Petlund… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Latency is increasingly becoming a performance bottleneck for Internet Protocol (IP)
networks, but historically, networks have been designed with aims of maximizing throughput …

Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process

B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
The identification of network attacks which target information and communication systems
has been a focus of the research community for years. Network intrusion detection is a …

[HTML][HTML] The DNS-based authentication of named entities (DANE) transport layer security (TLS) protocol: TLSA

P Hoffman, J Schlyter - 2012 - rfc-editor.org
RFC 6698: The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security
(TLS) Protocol: TLSA [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] …

[图书][B] Quantum networking

R Van Meter - 2014 - books.google.com
Quantum networks build on entanglement and quantum measurement to achieve tasks that
are beyond the reach of classical systems. Using quantum effects, we can detect the …

On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN

K Bhargavan, G Leurent - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
While modern block ciphers, such as AES, have a block size of at least 128 bits, there are
many 64-bit block ciphers, such as 3DES and Blowfish, that are still widely supported in …

Practical whole-system provenance capture

T Pasquier, X Han, M Goldstein, T Moyer… - Proceedings of the …, 2017 - dl.acm.org
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …

Physical layer security for beyond 5G: Ultra secure low latency communications

AK Yerrapragada, T Eisman… - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
If Beyond-5G (B5G)/6G is to support critical infrastructure worldwide, there must be an effort
to jointly integrate low latency and privacy into wireless protocols. This research analyzes …

Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples

R Bonetto, N Bui, V Lakkundi… - … symposium on a …, 2012 - ieeexplore.ieee.org
In this paper we discuss security procedures for constrained IoT devices. We start with the
description of a general security architecture along with its basic procedures, then discuss …

A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: A focus on systems, protocols, and applications

HH Jeong, YC Shen, JP Jeong, TT Oh - Vehicular Communications, 2021 - Elsevier
Dramatic increase in road traffic volume has made driving safety and traffic efficiency more
challenging, but smart transportation has been spotlighted as a promising technology for …

Security at the Edge for Resource-Limited IoT Devices

D Canavese, L Mannella, L Regano, C Basile - Sensors, 2024 - mdpi.com
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active
endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027 …