Articles with "protocols data" as a keyword



Photo by campaign_creators from unsplash

Cognitive and biologically cryptographic protocols for data security

Sign Up to like & get
recommendations!
Published in 2019 at "Cognitive Systems Research"

DOI: 10.1016/j.cogsys.2019.02.008

Abstract: Abstract This article presents new methods of cognitive computational paragigms dedicated to data security solutions. Especially, these paragidms will be presented based on new, combined classes of threshold schemes – names linguistic-biometric threshold schemes. Linguistic,… read more here.

Keywords: threshold schemes; security; protocols data; data security ... See more keywords
Photo by eugene_kuznetsov from unsplash

Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14100292

Abstract: Massive scale data centers (MSDC) have become a key component of current content-centric Internet architecture. With scales of up to hundreds of thousands servers, conveying traffic inside these infrastructures requires much greater connectivity resources than… read more here.

Keywords: routing protocols; experimenting routing; center simulation; protocols data ... See more keywords