Jonathan Northcroft, Waldemar Januszczak, John Dugdale, Jo Harrigan, Peter Fairley, Mark Stretton, Barney Spender, Matthew Wall, Barbara Hall, Alec Stewart, Sally Compton, Paul Farmer, Jeff Dawson, Fred Redwood, Jim Munro, David Brown, Tessa Mayes, James Clark, Nicholas Rufford, Chris Ryder, Rob Hughes, A R Rouse, John Peter, Pam Barrett, V S, Dan Pearson, Amanda Ursell, Sue Chester, Jonathan Miller, Derek Hodgson, Ester de Burgh Thomas, Emma Moore, Martin Bradshaw, Mark Wilton, J D, Leon Reis, Frank Whitford, Ivo Tennant, Nicolette Jones, Jonathan da Silva, Alistair Scott, Kathryn Cooper, David Smith, Kirstie Hamilton City Editor, Dari Cairns, Edin Hamzic, Rory Godson, Humphrey Carpenter, Dominic Utton, Richard Bond, Frank Kennedy, Frederic Raphael, Neil Wormald, E P, Clive Davis, Norman Coltham, K R, Colleen Frost, Lynne Truss, Maurice Williams, Kathy Brewis, Kenny Hunt, Thrasy Petropolous, Joseph Dunn, Zara Hill, Tony Allen-Mills, Simon Wilde, Anthony Sattin, Robert Winnett, Irwin Stelzer, Hugh Ball, Robert Hewison, Peter Wilson, David Dougill, Nicholas Hellen Social Affairs Editor, Jonny Scholes, Tony Marcus, Philip Kerr, Sue Clayton, Robert Peston, David Hewson, David Elstein, Barry Hugill, Jullan Muscat, Jonathon Carr-Brown, Hugh Canning, Geraldine Hackett Education Correspondent, Jeremy Clarkson, Stewart Lee, Edward Porter, Steve Coogan, Victoria Segal, Louise Taylor, Iain MacMaster, Max Anderson, Cheryl Markosky, James Clark Defence Correspondent, John O'Donnell, Nick Caln, Caroline Donald, Greg Struthers, James Delingpole, Tracy Chevalier, Liz Phillips, Adam Nathan, Victoria Hervey, J I, Paul Brazier, Mike Laws, Richard Johnson, Rev Andrew de Berry, Louis Farrakhan, Paul Ham, Roger Eglin, Geoffrey Stuttard, Brett Lee, Paul Donovan, Stuart Wavell, Tom Dillon, Josephine Smith, Alastair Hendy, Frans de Waal, Barbara Kasteleintel, Lucinda Kemeny, Jasper Gerard, Paul Driver, Michael Woodhead, Garth Pearce, John Humphrys, Patrick Garratt, John Follain, Nicholas Hellen, Richard Brooks, Viscountess Cobham, Ian Hawkey, Shelley Von Strunckel, Stuart Andrews, David Leppard, Paul Durman, Sam Boyd, Penelope, Mark Edwards, Kirstie Hamilton, G O'Sullivan, Sarah Gracie, Dave editor, Susan Clark, David Lawrenson, Kira Cochrane, Naomi Calne, Danny O'Brien, Phil Baker, Elspeth Burnside, Susan Greenfield, Duncan Clarke, Charles Jennings, Victoria O'Brien, Slobhan Mason, John O'donnell, Peter Martin, Raymond Keene, Cosmo Landesman, David Leppard Home Affairs Editor, Jim Irvin, Robbie Hudson, Diana Wright, Kipper Williams, Andy Knott, Anne Fairfoot, Ian Lee, Uzi Mahnaimi, Nick Cain, Michael Wright, Peta Bee, Flona McGoran, Susan Kelly, Nick Rennison, Keith Gordon, Serene Coyne, Rob Ryan, Keith Wheatley, Pat Butcher, Alun Roderick, David Walsh, Malcolm Carroll, Dawn Carr, Gareth Child, Fiona Godona, John Stern, Colin McDowell, Bryan Appleyard, Lois Rogers Medical Correspondent, Stephen Armstrong, John Elliott, John Locke, Emily Milich, Nick MacKinnon, Lorna McDonald-Smith, David Price, Roland White, Glyn Alexander, Garth Alexander, William Rees-Mogg, Colin Stevens, Neville Ablitt Managing Director, John Mellor, Dr Mark Griffiths, Viv Groskop, Mark Franchetti, Ray Hutton, Frank Fitzgibbon, Conor Ryan, Phil Dean, Jonathan Leake, Caroline Brien, Michael Sheridan, Margaret Walters, John Harlow, Simon Wilde Cricket correspondent, Lizzie Jones, John Urbanek, Dipesh Gadher, Hilary Lowe, Barry Collins, Bill Kean, John Waples, A A Gill, Melanie McDonagh, Matthew Campbell, Brian Glanville, Robert Steiner, Winner's Dinners, Tom Robbins, Nadine Meisner, Maurice Anthony, Judy Buckley, Stephen Pettitt, Robert Johnston, Jonathan Carr-Brown, Winston Chow, Jonathan Leake Science Editor, Ian Campbell, R H, Sally Kinnes, Naomi Caine, David Wickers, Roger Dobson, Melanie McDonger, Graham Hopkins, Graharn Wale, George Peabody, Andrew Frankel, Graham Norwood, Jonathan Futrell, Linda Watson, Rupert Steiner, John Cole, Geoffrey West, Brian Pendreigh, Dan Cairns, Correlli Barnett, David Parsley, Mrs Mills, John Alzlewood, David Smith Economics Editor, Mike Philips, Simon Trump, Christian Dymond, Steve Powell, Anthony Howard, Sarah Baxter, Penny Perrick, Shireen Jilla, Joanna Simon, India Knight, William Cash's, Steve Grant, Simon Howard, Alexander Games, Ruth Robson, Sarah Wynter, Dr Mark Charig, Rosie Waterhouse, Boris Schapiro, Karen Robinson, Ian Watson,
... Bus ticket clue to Real IRA bombers Travel Internet Are Any Sections ... rights act to spread its message online Sex clinic targets boys of 11 with ...
2001 - Gale Group | Sunday Times HA GDA
Hsing‐Chung Chen, Shian‐Shyong Tseng, Chuan-Hsien Mao, Chao-Ching Lee, Rendabel Churniawan,
... Protocol (SMTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol version 4 (IMAP4), and HTTPS being used by remote web-based email. However, in Internet, there are many flooding attacks will try to ...
Tópico(s):
2013 - Springer Science+Business Media | Lecture notes in electrical engineering
Michael Chesher, Rukesh Kaura,
... Standards.- SMTP/MIME - Electronic Mail.- POP and IMAP - Message Access Protocols.- DNS - Directory Name Service.- Internet and X.400 Service Models.- Internet and X.400 E-mail Co-existence.- EDI Standards.- EDI Message Structure.- Operation of EDI.- EDI Standards Summary.- EDI ...
Tópico(s): ICT Impact and Policies
1998 - | Practitioner series
... optimal breaking of a transmission control protocol (TCP)/Internet protocol (IP) message into medium access control (MAC) packets in networks without cut-through ...
Tópico(s): Advanced Wireless Network Optimization
2003 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications
... Transfer Protocol), FTP, POP (Post Office Protocol), IMAP (Internet Message Access Protocol), and XML-RPQ and server frameworks (for "out ...
Tópico(s): Distributed and Parallel Computing Systems
2005 - IEEE Computer Society | IEEE Distributed Systems Online
Thomas Girdler, Vassilios G. Vassilakis,
... Protocol (ARP) spoofing, where adversaries sends fabricated ARP messages, linking their Media Access Control (MAC) address to a genuine device’s Internet Protocol (IP) address. We developed a Software-Defined Networking ( ...
Tópico(s):
2021 - Elsevier BV | Computers & Electrical Engineering
Salekul Islam, J. William Atwood,
... IGMPv3 protocol, and called our new version the Internet group management protocol with access control (IGMP-AC). New messages and reception states have been added to IGMPv3, ...
Tópico(s): Mobile Agent-Based Network Management
2006 - Institute of Electrical and Electronics Engineers | Conference on Local Computer Networks
Diego Piedrahita, Francisco Machío, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo,
... such as Simple Mail Transfer Protocol, Post office Protocol, Internet Message Access Protocol protocols, among others. An analysis of the main ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2020 - World Scientific | International Journal of Uncertainty Fuzziness and Knowledge-Based Systems
Alban Gabillon, Romane Gallier, Emmanuel Bruno,
The message queuing telemetry transport (MQTT) protocol is becoming the main protocol for the internet of things (IoT). In this paper, we define a highly expressive attribute-based access control (ABAC) security model for the MQTT protocol. Our model allows us to regulate not only publications and subscriptions, but also distribution of messages to subscribers. We can express various types of ...
Tópico(s): Cloud Data Security Solutions
2019 - Springer Nature | SN Computer Science
Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the theorem prover Isabelle. Proofs are based on higher-order logic and make no assumptions concerning beliefs of finiteness. All the obvious security goals can be proved; session resumption appears to be secure even if old session keys are compromised. The proofs suggest minor changes to simplify the analysis. TLS, even at an abstract level, is much ...
Tópico(s):
1999 - Association for Computing Machinery | ACM Transactions on Information and System Security
... and there was a core network testbed and protocol stack, information flow, operation, and parameters of signaling messages for wireless Internet access of the visiting ISP subscriber. We implement SGSN, ...
Tópico(s): Wireless Networks and
2003 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Consumer Electronics
Salekul Islam, J. William Atwood,
... can join any multicast group by sending an Internet Group Management Protocol (IGMP) join message without prior authentication and authorization. We have developed a novel, scalable and secured access control architecture for IP multicast that deploys Authentication ...
Tópico(s): Mobile Agent-Based Network Management
2008 - Elsevier BV | Computer Networks
Alban Gabillon, Emmanuel Bruno,
The MQTT (Message Queuing Telemetry Transport) protocol is becoming the main protocol for the Internet of Things (IoT). In this paper, we define a highly expressive ABAC (Attribute-Based Access Control) security model for the MQTT protocol. Our model allows us to regulate not only publications and subscriptions but also distribution of messages to subscribers. We can express various types of ...
Tópico(s): Distributed systems and fault tolerance
2018 - Springer Science+Business Media | Lecture notes in computer science
Blockchain technology can benefit Internet of Things (IoT) in terms of message exchange, access control and management, however, existing blockchain consensus protocols cannot provide sufficient performance without compromising security and fairness. This paper proposes a round-based two-stage blockchain consensus protocol ...
Tópico(s): Distributed systems and fault tolerance
2021 - Institute of Electrical and Electronics Engineers | IEEE Internet of Things Journal
Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li,
... CoAP runs over UDP, resulting in an unreliable message transport. CoAP offers a request/response communication model among application endpoints. The Internet Protocol Security (IPsec) can offer various security services like limited traffic flow confidentiality, anti-replay mechanism, access control, confidentiality, connection-less integrity, and data origin ...
Tópico(s): RFID technology advancements
2019 - Springer Science+Business Media | Internet of things
Frances Griffiths, Carol Bryce, Jonathan Cave, Melina Dritsaki, Joseph Fraser, Kathryn Hamilton, Caroline Huxley, Agnieszka Ignatowicz, Sung Wook Kim, Peter Kimani, Jason Madan, Anne‐Marie Slowther, Mark Sujan, Jackie Sturt,
... clinical teams variously used mobile phone calls, text messages, email, and voice over Internet protocol. Length of clinician use of digital communication varied from 1 to 13 years in 17 case studies, and was being considered in 3. Digital communication enables timely access for young people to the right clinician at ...
Tópico(s): Child and Adolescent Health
2017 - JMIR Publications | Journal of Medical Internet Research
Ahmed K. Al-Ani, Mohammed Anbar, Selvakumar Manickam, Ayman Al-Ani, Yu‐Beng Leau,
... functions, aims to obtain the corresponding relationship between Internet protocol and media access control addresses. This process uses two NDP messages, neighbor solicitation (NS) and neighbor advertisement (NA) messages, ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2018 - Springer Science+Business Media | Lecture notes in electrical engineering
Automatic protocol reverse engineering is a process of extracting protocol message formats and protocol state machine without access to the specification of target protocol. Protocol reverse engineering is useful for addressing many problems of network management and security, such as network management, honey-pot systems, intrusion detection, Botnet detection and prevention, and so on. Currently, protocol reverse engineering is mainly a manual and painstaking process which is time-consuming and ...
Tópico(s):
2013 - Elsevier BV | Journal of Network and Computer Applications
... e-mail protocols: POP (post office protocol), IMAP (Internet message access protocol), and SMTP (simple mail transfer protocol). SMTP is used to send e-mail from the server, whereas POP and IMAP are used to retrieve e-mail.Both POP and IMAP follow the client-server model. That means that your e-mail is sent to your e-mail server (a computer connected to the Internet) and held there by the server until you ...
Tópico(s): Multimedia Communication and Technology
2005 - American Psychiatric Association Publishing | Psychiatric News
Simone Munsch, Andrea Wyssen, Pierre Vanhulst, Denis Lalanne, Sharon T. Steinemann, Alexandre N. Tuch,
... period. The pure waitlist control group receives weekly messages simply asking patients to fill in a short questionnaire. The access to evidence-based treatments for BED might be made easier using an Internet-based GSH approach. The present study protocol presents a randomized controlled trial. As well as ...
Tópico(s): Behavioral Health and Interventions
2019 - Springer Science+Business Media | Trials
The SET payment protocol uses digital signatures to authenticate messages and authorize transactions. It is assumed that these digital signatures make authorizations non-repudiable, i.e., provable to a third-party verifier. This paper evaluates what can be proved with the digital signatures in SET. The analysis shows that even a successful and completed SET protocol run does not give the parties enough evidence to prove certain important transaction features. A comparison with the similarly-structured ...
Tópico(s):
2001 - Springer Science+Business Media | Lecture notes in computer science
... a mobile Web Services middleware that converts conventional internet services into mobile Web services. We implemented a WSDL (Web Service Description Language) builder that converts HTML/XML into WSDL and a SAOP (Simple Object Access Protocol) message processor that performs SOAP message handling, chain and handling of server requests. The former minimizes the overhead cost of rebuilding mobile Web Services and enables seamless services between wired and wireless internet services. The latter enhances SOAP processing performance by ...
Tópico(s): Caching and Content Delivery
2005 - Korea Institute of Information and Communication Engineering | Journal of information and communication convergence engineering
... client using either post office protocol (POP) or Internet message access protocol (IMAP). SMTP is also generally used to send messages from a mail client to a mail server in “hostbased” (or Unix-based) mail systems, where a simple mbox utility might be on the same system [or via Network File System (NFS) provided by Novell for access without POP or IMAP. SMTP is used as the common mechanism for transporting electronic mail among different hosts within the transmission control protocol/Internet protocol (TCP/IP) suite. It is an application ...
Tópico(s): Network Security and Intrusion Detection
2017 - IJARIIE | International journal of advance research and innovative ideas in education
Depuri Sandeep Kumar, Punugoti Pavan Kumar,
... transfer protocol (SMTP), post office protocol (POP), and internet message access protocol (IMAP) transfer and store email messages in plaintext. ...
Tópico(s): Caching and Content Delivery
2015 - | International Journal of Science and Research (IJSR)
Mohammad Reza Nikseresht, Mahdi Mollamotalebi,
... of applications on the sensor network and their access to the Internet. Each of the layers of the 6LoWPAN/CoAP protocol stack imposes an overhead on the transmitted messages, and the resulting data overhead intensifies the energy ...
Tópico(s): Energy Harvesting in Wireless Networks
2021 - Elsevier BV | Computer Communications
Mohammed Anbar, Rosni Abdullah, Redhwan M. A. Saad, Esraa Saleh Alomari, Samer Alsaleem,
... NDP), that replaces Address Resolution Protocol (ARP) in Internet Protocol version 4 (IPv4), router discovery, and redirect. If implemented without any security mechanism, NDP contains vulnerabilities. Using spoofed Media Access Control (MAC) addresses in an NDP message, a malicious host can launch Denial-of -Service ...
Tópico(s):
2016 - Springer Science+Business Media | Lecture notes in electrical engineering
Deepthi Ratnayake, Hassan Kazemian, Syed Adnan Yusuf,
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversaries exploit these weaknesses to flood APs with probe requests, which can generate a denial of service (DoS) to genuine STAs. The research examines traffic of a ...
Tópico(s): Wireless Networks and
2013 - Springer Science+Business Media | Neural Computing and Applications
Luis Cruz-Piris, Diego Rivera, Iván Marsá-Maestre, Enrique de la Hoz, Juan R. Velasco,
... has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating ...
Tópico(s): Vehicular Ad Hoc Networks (VANETs)
2018 - Multidisciplinary Digital Publishing Institute | Sensors
Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Lüdwig Seitz, Marco Tiloca,
... Constrained Application Protocol (CoAP) is a standard communication protocol for resource-constrained devices in the Internet of Things (IoT). Many IoT deployments require proxies to support asynchronous communication between edge devices and the back-end. This allows (non-trusted) proxies to access sensitive parts of CoAP messages. Object Security for Constrained RESTful Environments (OSCORE) is a recent standard protocol that provides end-to-end security for CoAP ...
Tópico(s): Real-Time Systems Scheduling
2020 - Elsevier BV | Internet of Things
Rui Huang, Jing Wu, Chengnian Long, Yanmin Zhu, Bo Li, Yi‐Bing Lin,
... of cooperative awareness messages and decentralized environmental notification messages on the control channel. As vehicles advance toward higher automation levels, VANETs should support more complex traffic services, which generates the demand for the propagation of Internet Protocol (IP)-based information and service data in multichannel environment as specified by IEEE Standard for Wireless Access in Vehicular Environments (WAVE). Multisource propagation in the ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2017 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Vehicular Technology