Limpar
36 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Kenneth J. Turner, Iain A. Robin,

... link-level protocols to application-oriented protocols. The Trivial File Transfer Protocol is used to illustrate in detail how a ...

Tópico(s): Simulation Techniques and Applications

2001 - Elsevier BV | Computer Standards & Interfaces

Artigo Revisado por pares

Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim,

Tópico(s): Cloud Data Security Solutions

2018 - Springer Science+Business Media | Telecommunication Systems

Artigo Revisado por pares

Boris Sieklik, Richard Macfarlane, William J. Buchanan,

... and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP). This attack could have amplification factor of ...

Tópico(s): Advanced Malware Detection Techniques

2015 - Elsevier BV | Computers & Security

Artigo Acesso aberto Revisado por pares

Goran Horvat, Drago Žagar, Goran Martinović,

... One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP). The main advantage of using TFTP in ...

Tópico(s): Chaos-based Image/Signal Encryption

2013 - Ștefan cel Mare University of Suceava | Advances in Electrical and Computer Engineering

Artigo

Goran Horvat, Damir Šoštarić, Zoran Balkić,

... communication compared to the existing protocols such as Trivial File Transfer Protocol (TFTP) results in higher data rate and lower ...

Tópico(s): Energy Efficient Wireless Sensor Networks

2012 - Institute of Advanced Engineering and Science (IAES) | International Journal of Electrical and Computer Engineering (IJECE)

Artigo

Tzi‐cker Chiueh, Chieh-Chung Chang,

... the design, implementation, and evaluation of a broadcast trivial file transfer (BTFTP) protocol, which can be used as an efficient data ...

Tópico(s): Multimedia Communication and Technology

1997 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE

Artigo Revisado por pares

K. Rasool Reddy, Ch. Madhava Rao,

... server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded ...

Tópico(s): Advanced Malware Detection Techniques

2018 - American Institute of Physics | AIP conference proceedings

Artigo Acesso aberto

Anif Jamaluddin, Nur Nabila Mohamed, H. Hashim,

... lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process ...

Tópico(s): Advanced Malware Detection Techniques

2018 - | International Journal of Engineering & Technology

Artigo Revisado por pares

Peter Planinšič, Dušan Gleich, J. Mohorko,

... wireless network using Internet protocol/user datagram protocol/trivial file transfer protocol (IP/UDP/TFTP).

Tópico(s): Digital Filter Design and Implementation

2006 - SPIE | Journal of Electronic Imaging

Artigo Revisado por pares

J.E. Cooling,

... link-level protocols to application-oriented protocols. The Trivial File Transfer Protocol is used to illustrate in detail how a ...

Tópico(s): Multimedia Communication and Technology

1995 - Elsevier BV | Computer Communications

Artigo Acesso aberto Revisado por pares

Nikolaos Bartzoudis, José Rubio Fernández, David López‐Bueno, Antonio Villarroel, Angelos Antonopoulos,

... are fetched from a remote location using the trivial file transfer protocol (TFTP). ReproRun can be applied in different FPGA ...

Tópico(s): VLSI and FPGA Design Techniques

2024 - Multidisciplinary Digital Publishing Institute | Electronics

Artigo Acesso aberto Revisado por pares

Keon-Ho Park, Seong-Jin Kim, Joobeom Yun, Seung‐Ho Lim, Ki-Woong Park,

... platform is hindered by several factors. Firstly, the trivial file transfer protocol (TFTP), which is generally used for network boot, ...

Tópico(s): Network Security and Intrusion Detection

2021 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo

Nur Nabila Mohamed, Yusnani Mohd Yussoff, Habibah Hashim,

Tópico(s): Advanced Authentication

2017 - Medwell Publications | Journal of Engineering and Applied Sciences

Artigo

Liya Li,

... Environment), DHCP(Dynamic Host Configuration Protocol) and TFTP(Trivial File Transfer Protocol)) which were provided by management servers, mounted the ...

Tópico(s): Peer-to-Peer Network Technologies

2015 - Science Press | Journal of Computer Applications

Artigo

Elizabeth Yetisir, Harvey Nelson, Robin S. Roberts,

... attacks, and even basic protocol servers such as Trivial File Transfer Protocol (TFTP) servers or FTP servers. Ruby has two ...

Tópico(s): Scientific Computing and Data Management

1990 - Elsevier BV | Controlled Clinical Trials

Artigo Acesso aberto

A. Jamaluddin, N. N. Mohamed, H. Hashim,

... lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process ...

Tópico(s): Advanced Malware Detection Techniques

2018 - | International Journal of Engineering & Technology

Artigo Acesso aberto

Lou Chen,

Trivial File Transfer Protocol (TFTP) is a simple lockstep file transfer protocol.In this paper we use PAT, a model ...

Tópico(s): Fault Detection and Control Systems

2018 - | Journal of Advances in Computer Networks

Artigo Revisado por pares

Chong Yu Wei, Zu Ping Gu, Shuai Huang,

... net interface module and a server based on Trivial File Transfer Protocol (TFTP). Here a new method using an SD ...

Tópico(s): Embedded Systems and FPGA Design

2012 - Trans Tech Publications | Advanced materials research

Artigo Revisado por pares

Jianing Wang,

... hardware configuration and control software core.It extends Trivial File Transfer Protocol(TFTP) server into a special transmitting and writing ...

Tópico(s): Advanced Sensor and Control Systems

2011 - East China Computer Technology Research Institute | Jisuanji gongcheng

Artigo Acesso aberto Revisado por pares

Guillaume Celosia, Mathieu Cunche,

... allow seamless nearby applications such as activity and file transfer, device pairing and sharing a network connection. Those protocols rely on Bluetooth Low Energy (BLE) to exchange information between ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2020 - De Gruyter Open | Proceedings on Privacy Enhancing Technologies

Capítulo de livro Acesso aberto Revisado por pares

A. Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann,

... protocols and a property language for expressing non-trivial security properties of such protocols. We motivate this work using the envelope protocol [] as an example, which ensures auditable transfers by means of a TPM, that guarantees that ...

Tópico(s): User Authentication and Security Systems

2021 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Nikolaos E. Palaiodimopoulos, Ioannis Brouzos, F. Κ. Diakonos, G. Theocharis,

... advantage of resonant effects to speed up the transfer process. Using optimal control theory, we confirm that the proposed time-driving function is close to optimal. To unravel the crucial aspects of our construction, we proceed to a comparison with two other protocols. One where the underlying Su-Schrieffer-Heeger chain is adiabatically time-driven and another where the underlying chain is topologically trivial and resonant effects are at work. By numerically ...

Tópico(s): Quantum and electron transport phenomena

2021 - American Physical Society | Physical review. A/Physical review, A

Capítulo de livro Acesso aberto Revisado por pares

Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan,

We describe a new protocol to achieve two party \(\varepsilon \)-fair exchange: at any point in the unfolding of the protocol the difference in the probabilities of the parties having acquired the desired term is bounded by a value \(\varepsilon \) that can be made as small as necessary. Our construction uses oblivious transfer and sidesteps previous impossibility results by using a timed-release encryption, that releases its contents only after some lower bounded time. We show that our protocol can be easily ...

Tópico(s): Advanced Authentication

2021 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner,

... four-round lower bound, obtaining a five-round protocol that makes black-box use of oblivious transfer and PKE with pseudorandom public keys. In this ... making black-box use of two-round oblivious transfer. As an additional result, we construct the first four-round MPC protocol for generic functionalities that makes black-box use ... primitives, achieving security against non-aborting adversaries. Our protocols are based on a new primitive called list two-party computation. This primitive offers relaxed security compared to the standard notion of secure two-party computation. Despite this relaxation, we argue that this tool suffices for our applications. List two-party computation is of independent interest, as we argue it can also be used for the generation of setups, like oblivious transfer correlated randomness, in three rounds. Prior to our ...

Tópico(s): Cryptographic Implementations and Security

2023 - Springer Science+Business Media | Lecture notes in computer science

Revisão Acesso aberto Revisado por pares

Neal Haddaway, Elie A. Akl, Matthew J. Page, Vivian Welch, Ciara Keenan, Tamara Lotfi,

... code annotation practices). However, this point is not trivial and highlights the need for careful planning across ... editing. Download .xml (.0 MB) Help with xml files Data Profile

Tópico(s): Artificial Intelligence in Healthcare and Education

2020 - Elsevier BV | Journal of Clinical Epidemiology

Artigo Acesso aberto Revisado por pares

Hannah C. Nerl, Kirsten T. Winther, Fredrik S. Hage, Kristian S. Thygesen, Lothar Houben, Claudia Backes, Jonathan N. Coleman, Quentin M. Ramasse, Valeria Nicolosi,

... energy-loss peaks. We also rationalise the non-trivial dependence of the EEL spectrum on beam and ... of collective excitations. Our work provides a template protocol for mapping the local nature of electronic excitations ...

Tópico(s): Quantum Dots Synthesis And Properties

2017 - Nature Portfolio | npj 2D Materials and Applications

Artigo Acesso aberto Revisado por pares

Maud Frieden, Dominic I. James, Cyril Castelbou, Anne Danckaert, Jean‐Claude Martinou, Nicolas Demaurex,

... on the endoplasmic reticulum (ER) 1The abbreviations and trivial names used are: ER, endoplasmic reticulum; CCE, capacitative ... ester; GFP, green fluorescent protein. 1The abbreviations and trivial names used are: ER, endoplasmic reticulum; CCE, capacitative ...

Tópico(s): Metabolism and Genetic Disorders

2004 - Elsevier BV | Journal of Biological Chemistry

Artigo Acesso aberto Revisado por pares

David Megías, Amna Qureshi,

... this drawback is overcome by introducing two non-trivial improvements, paving the way for a future real- ...

Tópico(s): Chaos-based Image/Signal Encryption

2016 - Elsevier BV | Expert Systems with Applications

Artigo Acesso aberto Revisado por pares

Mahendra S. Rao,

... more subtle, and creating meaningful solutions is not trivial. An example of one such issue is the ...

Tópico(s): CRISPR and Genetic Engineering

2013 - Elsevier BV | Cell stem cell

Artigo Acesso aberto Revisado por pares

Alpteki̇n Küpçü, Anna Lysyanskaya,

... with a trusted party, it is still non-trivial to come up with an efficient solution, especially ...

Tópico(s): Blockchain Technology Applications and Security

2011 - Elsevier BV | Computer Networks