Kenneth J. Turner, Iain A. Robin,
... link-level protocols to application-oriented protocols. The Trivial File Transfer Protocol is used to illustrate in detail how a ...
Tópico(s): Simulation Techniques and Applications
2001 - Elsevier BV | Computer Standards & Interfaces
Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim,
Tópico(s): Cloud Data Security Solutions
2018 - Springer Science+Business Media | Telecommunication Systems
Boris Sieklik, Richard Macfarlane, William J. Buchanan,
... and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP). This attack could have amplification factor of ...
Tópico(s): Advanced Malware Detection Techniques
2015 - Elsevier BV | Computers & Security
Goran Horvat, Drago Žagar, Goran Martinović,
... One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP). The main advantage of using TFTP in ...
Tópico(s): Chaos-based Image/Signal Encryption
2013 - Ștefan cel Mare University of Suceava | Advances in Electrical and Computer Engineering
Goran Horvat, Damir Šoštarić, Zoran Balkić,
... communication compared to the existing protocols such as Trivial File Transfer Protocol (TFTP) results in higher data rate and lower ...
Tópico(s): Energy Efficient Wireless Sensor Networks
2012 - Institute of Advanced Engineering and Science (IAES) | International Journal of Electrical and Computer Engineering (IJECE)
Tzi‐cker Chiueh, Chieh-Chung Chang,
... the design, implementation, and evaluation of a broadcast trivial file transfer (BTFTP) protocol, which can be used as an efficient data ...
Tópico(s): Multimedia Communication and Technology
1997 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE
K. Rasool Reddy, Ch. Madhava Rao,
... server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded ...
Tópico(s): Advanced Malware Detection Techniques
2018 - American Institute of Physics | AIP conference proceedings
Anif Jamaluddin, Nur Nabila Mohamed, H. Hashim,
... lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process ...
Tópico(s): Advanced Malware Detection Techniques
2018 - | International Journal of Engineering & Technology
Peter Planinšič, Dušan Gleich, J. Mohorko,
... wireless network using Internet protocol/user datagram protocol/trivial file transfer protocol (IP/UDP/TFTP).
Tópico(s): Digital Filter Design and Implementation
2006 - SPIE | Journal of Electronic Imaging
... link-level protocols to application-oriented protocols. The Trivial File Transfer Protocol is used to illustrate in detail how a ...
Tópico(s): Multimedia Communication and Technology
1995 - Elsevier BV | Computer Communications
Nikolaos Bartzoudis, José Rubio Fernández, David López‐Bueno, Antonio Villarroel, Angelos Antonopoulos,
... are fetched from a remote location using the trivial file transfer protocol (TFTP). ReproRun can be applied in different FPGA ...
Tópico(s): VLSI and FPGA Design Techniques
2024 - Multidisciplinary Digital Publishing Institute | Electronics
Keon-Ho Park, Seong-Jin Kim, Joobeom Yun, Seung‐Ho Lim, Ki-Woong Park,
... platform is hindered by several factors. Firstly, the trivial file transfer protocol (TFTP), which is generally used for network boot, ...
Tópico(s): Network Security and Intrusion Detection
2021 - Multidisciplinary Digital Publishing Institute | Sensors
Nur Nabila Mohamed, Yusnani Mohd Yussoff, Habibah Hashim,
Tópico(s): Advanced Authentication
2017 - Medwell Publications | Journal of Engineering and Applied Sciences
... Environment), DHCP(Dynamic Host Configuration Protocol) and TFTP(Trivial File Transfer Protocol)) which were provided by management servers, mounted the ...
Tópico(s): Peer-to-Peer Network Technologies
2015 - Science Press | Journal of Computer Applications
Elizabeth Yetisir, Harvey Nelson, Robin S. Roberts,
... attacks, and even basic protocol servers such as Trivial File Transfer Protocol (TFTP) servers or FTP servers. Ruby has two ...
Tópico(s): Scientific Computing and Data Management
1990 - Elsevier BV | Controlled Clinical Trials
A. Jamaluddin, N. N. Mohamed, H. Hashim,
... lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process ...
Tópico(s): Advanced Malware Detection Techniques
2018 - | International Journal of Engineering & Technology
Trivial File Transfer Protocol (TFTP) is a simple lockstep file transfer protocol.In this paper we use PAT, a model ...
Tópico(s): Fault Detection and Control Systems
2018 - | Journal of Advances in Computer Networks
Chong Yu Wei, Zu Ping Gu, Shuai Huang,
... net interface module and a server based on Trivial File Transfer Protocol (TFTP). Here a new method using an SD ...
Tópico(s): Embedded Systems and FPGA Design
2012 - Trans Tech Publications | Advanced materials research
... hardware configuration and control software core.It extends Trivial File Transfer Protocol(TFTP) server into a special transmitting and writing ...
Tópico(s): Advanced Sensor and Control Systems
2011 - East China Computer Technology Research Institute | Jisuanji gongcheng
Guillaume Celosia, Mathieu Cunche,
... allow seamless nearby applications such as activity and file transfer, device pairing and sharing a network connection. Those protocols rely on Bluetooth Low Energy (BLE) to exchange information between ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2020 - De Gruyter Open | Proceedings on Privacy Enhancing Technologies
A. Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann,
... protocols and a property language for expressing non-trivial security properties of such protocols. We motivate this work using the envelope protocol [] as an example, which ensures auditable transfers by means of a TPM, that guarantees that ...
Tópico(s): User Authentication and Security Systems
2021 - Springer Science+Business Media | Lecture notes in computer science
Nikolaos E. Palaiodimopoulos, Ioannis Brouzos, F. Κ. Diakonos, G. Theocharis,
... advantage of resonant effects to speed up the transfer process. Using optimal control theory, we confirm that the proposed time-driving function is close to optimal. To unravel the crucial aspects of our construction, we proceed to a comparison with two other protocols. One where the underlying Su-Schrieffer-Heeger chain is adiabatically time-driven and another where the underlying chain is topologically trivial and resonant effects are at work. By numerically ...
Tópico(s): Quantum and electron transport phenomena
2021 - American Physical Society | Physical review. A/Physical review, A
Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan,
We describe a new protocol to achieve two party \(\varepsilon \)-fair exchange: at any point in the unfolding of the protocol the difference in the probabilities of the parties having acquired the desired term is bounded by a value \(\varepsilon \) that can be made as small as necessary. Our construction uses oblivious transfer and sidesteps previous impossibility results by using a timed-release encryption, that releases its contents only after some lower bounded time. We show that our protocol can be easily ...
Tópico(s): Advanced Authentication
2021 - Springer Science+Business Media | Lecture notes in computer science
Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Hendrik Waldner,
... four-round lower bound, obtaining a five-round protocol that makes black-box use of oblivious transfer and PKE with pseudorandom public keys. In this ... making black-box use of two-round oblivious transfer. As an additional result, we construct the first four-round MPC protocol for generic functionalities that makes black-box use ... primitives, achieving security against non-aborting adversaries. Our protocols are based on a new primitive called list two-party computation. This primitive offers relaxed security compared to the standard notion of secure two-party computation. Despite this relaxation, we argue that this tool suffices for our applications. List two-party computation is of independent interest, as we argue it can also be used for the generation of setups, like oblivious transfer correlated randomness, in three rounds. Prior to our ...
Tópico(s): Cryptographic Implementations and Security
2023 - Springer Science+Business Media | Lecture notes in computer science
Neal Haddaway, Elie A. Akl, Matthew J. Page, Vivian Welch, Ciara Keenan, Tamara Lotfi,
... code annotation practices). However, this point is not trivial and highlights the need for careful planning across ... editing. Download .xml (.0 MB) Help with xml files Data Profile
Tópico(s): Artificial Intelligence in Healthcare and Education
2020 - Elsevier BV | Journal of Clinical Epidemiology
Hannah C. Nerl, Kirsten T. Winther, Fredrik S. Hage, Kristian S. Thygesen, Lothar Houben, Claudia Backes, Jonathan N. Coleman, Quentin M. Ramasse, Valeria Nicolosi,
... energy-loss peaks. We also rationalise the non-trivial dependence of the EEL spectrum on beam and ... of collective excitations. Our work provides a template protocol for mapping the local nature of electronic excitations ...
Tópico(s): Quantum Dots Synthesis And Properties
2017 - Nature Portfolio | npj 2D Materials and Applications
Maud Frieden, Dominic I. James, Cyril Castelbou, Anne Danckaert, Jean‐Claude Martinou, Nicolas Demaurex,
... on the endoplasmic reticulum (ER) 1The abbreviations and trivial names used are: ER, endoplasmic reticulum; CCE, capacitative ... ester; GFP, green fluorescent protein. 1The abbreviations and trivial names used are: ER, endoplasmic reticulum; CCE, capacitative ...
Tópico(s): Metabolism and Genetic Disorders
2004 - Elsevier BV | Journal of Biological Chemistry
... this drawback is overcome by introducing two non-trivial improvements, paving the way for a future real- ...
Tópico(s): Chaos-based Image/Signal Encryption
2016 - Elsevier BV | Expert Systems with Applications
... more subtle, and creating meaningful solutions is not trivial. An example of one such issue is the ...
Tópico(s): CRISPR and Genetic Engineering
2013 - Elsevier BV | Cell stem cell
Alpteki̇n Küpçü, Anna Lysyanskaya,
... with a trusted party, it is still non-trivial to come up with an efficient solution, especially ...
Tópico(s): Blockchain Technology Applications and Security
2011 - Elsevier BV | Computer Networks