Limpar
36 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Kenneth J. Turner, Iain A. Robin,

... link-level protocols to application-oriented protocols. The Trivial File Transfer Protocol is used to illustrate in detail how a ...

Tópico(s): Simulation Techniques and Applications

2001 - Elsevier BV | Computer Standards & Interfaces

Artigo Revisado por pares

Boris Sieklik, Richard Macfarlane, William J. Buchanan,

... and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP). This attack could have amplification factor of ...

Tópico(s): Advanced Malware Detection Techniques

2015 - Elsevier BV | Computers & Security

Artigo Revisado por pares

Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim,

Tópico(s): Cloud Data Security Solutions

2018 - Springer Science+Business Media | Telecommunication Systems

Artigo Acesso aberto Revisado por pares

Goran Horvat, Drago Žagar, Goran Martinović,

... One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP). The main advantage of using TFTP in ...

Tópico(s): Chaos-based Image/Signal Encryption

2013 - Ștefan cel Mare University of Suceava | Advances in Electrical and Computer Engineering

Artigo

Goran Horvat, Damir Šoštarić, Zoran Balkić,

... communication compared to the existing protocols such as Trivial File Transfer Protocol (TFTP) results in higher data rate and lower ...

Tópico(s): Energy Efficient Wireless Sensor Networks

2012 - Institute of Advanced Engineering and Science (IAES) | International Journal of Electrical and Computer Engineering (IJECE)

Artigo

Tzi‐cker Chiueh, Chieh-Chung Chang,

... the design, implementation, and evaluation of a broadcast trivial file transfer (BTFTP) protocol, which can be used as an efficient data ...

Tópico(s): Multimedia Communication and Technology

1997 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE

Artigo Revisado por pares

K. Rasool Reddy, Ch. Madhava Rao,

... server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded ...

Tópico(s): Advanced Malware Detection Techniques

2018 - American Institute of Physics | AIP conference proceedings

Artigo Acesso aberto

Anif Jamaluddin, Nur Nabila Mohamed, H. Hashim,

... lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process ...

Tópico(s): Advanced Malware Detection Techniques

2018 - | International Journal of Engineering & Technology

Artigo Revisado por pares

Peter Planinšič, Dušan Gleich, J. Mohorko,

... wireless network using Internet protocol/user datagram protocol/trivial file transfer protocol (IP/UDP/TFTP).

Tópico(s): Digital Filter Design and Implementation

2006 - SPIE | Journal of Electronic Imaging

Artigo Revisado por pares

J.E. Cooling,

... link-level protocols to application-oriented protocols. The Trivial File Transfer Protocol is used to illustrate in detail how a ...

Tópico(s): Multimedia Communication and Technology

1995 - Elsevier BV | Computer Communications

Artigo

Nur Nabila Mohamed, Yusnani Mohd Yussoff, Habibah Hashim,

Tópico(s): Advanced Authentication

2017 - Medwell Publications | Journal of Engineering and Applied Sciences

Artigo Acesso aberto Revisado por pares

Nikolaos Bartzoudis, José Rubio Fernández, David López‐Bueno, Antonio Villarroel, Angelos Antonopoulos,

... are fetched from a remote location using the trivial file transfer protocol (TFTP). ReproRun can be applied in different FPGA ...

Tópico(s): VLSI and FPGA Design Techniques

2024 - Multidisciplinary Digital Publishing Institute | Electronics

Artigo Acesso aberto Revisado por pares

Keon-Ho Park, Seong-Jin Kim, Joobeom Yun, Seung‐Ho Lim, Ki-Woong Park,

... platform is hindered by several factors. Firstly, the trivial file transfer protocol (TFTP), which is generally used for network boot, ...

Tópico(s): Network Security and Intrusion Detection

2021 - Multidisciplinary Digital Publishing Institute | Sensors

Artigo

Liya Li,

... Environment), DHCP(Dynamic Host Configuration Protocol) and TFTP(Trivial File Transfer Protocol)) which were provided by management servers, mounted the ...

Tópico(s): Peer-to-Peer Network Technologies

2015 - Science Press | Journal of Computer Applications

Artigo

Elizabeth Yetisir, Harvey Nelson, Robin S. Roberts,

... attacks, and even basic protocol servers such as Trivial File Transfer Protocol (TFTP) servers or FTP servers. Ruby has two ...

Tópico(s): Scientific Computing and Data Management

1990 - Elsevier BV | Controlled Clinical Trials

Artigo Acesso aberto

A. Jamaluddin, N. N. Mohamed, H. Hashim,

... lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process ...

Tópico(s): Advanced Malware Detection Techniques

2018 - | International Journal of Engineering & Technology

Artigo Revisado por pares

Jianing Wang,

... hardware configuration and control software core.It extends Trivial File Transfer Protocol(TFTP) server into a special transmitting and writing ...

Tópico(s): Advanced Sensor and Control Systems

2011 - East China Computer Technology Research Institute | Jisuanji gongcheng

Artigo Revisado por pares

Chong Yu Wei, Zu Ping Gu, Shuai Huang,

... net interface module and a server based on Trivial File Transfer Protocol (TFTP). Here a new method using an SD ...

Tópico(s): Embedded Systems and FPGA Design

2012 - Trans Tech Publications | Advanced materials research

Artigo Acesso aberto

Lou Chen,

Trivial File Transfer Protocol (TFTP) is a simple lockstep file transfer protocol.In this paper we use PAT, a model ...

Tópico(s): Fault Detection and Control Systems

2018 - | Journal of Advances in Computer Networks

Capítulo de livro Acesso aberto Revisado por pares

Alptekın Küpçü, Anna Lysyanskaya,

... previous solutions employ costly cryptographic primitives for every file or block exchanged, our protocol employs them only once per peer, therefore achieving ... exchanged between two peers. The rest of our protocol uses very efficient cryptography, making it perfectly suitable for a p2p file sharing system where tens of peers exchange thousands ...

Tópico(s): Blockchain Technology Applications and Security

2010 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Alptekın Küpçü, Anna Lysyanskaya,

... previous solutions employ costly cryptographic primitives for every file or block exchanged, our protocol employs them only once per peer, therefore achieving ... n blocks are exchanged between two peers. Our protocol uses very efficient cryptography, making it perfectly suitable for a p-2-p file sharing system where tens of peers exchange thousands ...

Tópico(s): Blockchain Technology Applications and Security

2011 - Elsevier BV | Computer Networks

Artigo Acesso aberto Revisado por pares

Maud Frieden, Dominic I. James, Cyril Castelbou, Anne Danckaert, Jean‐Claude Martinou, Nicolas Demaurex,

... on the endoplasmic reticulum (ER) 1The abbreviations and trivial names used are: ER, endoplasmic reticulum; CCE, capacitative ... ester; GFP, green fluorescent protein. 1The abbreviations and trivial names used are: ER, endoplasmic reticulum; CCE, capacitative ... The border coordinates were exported in an Excel file (points x, y), and the impact points between ... CCE were then assessed by the Ca2+ readdition protocol or by the Mn2+ quench technique. As shown ...

Tópico(s): Metabolism and Genetic Disorders

2004 - Elsevier BV | Journal of Biological Chemistry

Artigo Acesso aberto Revisado por pares

Paul H. Jensen,

... implications of matching employer–employee datasets are non-trivial, the potential benefits are huge. Achieving these gains, ...

Tópico(s): Social Policy and Reform Studies

2010 - Wiley | Australian Economic Review

Artigo Acesso aberto Revisado por pares

William Gillette, Dominic Esposito, Peter Frank, Ming Zhou, Li‐Rong Yu, Catherine Jozwik, Xiuying Zhang, Brighid McGowan, David M. Jacobowitz, Harvey B. Pollard, Tong Hao, David E. Hill, Marc Vidal, Thomas P. Conrads, Timothy D. Veenstra, James L. Hartley,

... size and pI, and running them is not trivial. But they can resolve thousands of proteins, and ... assistance. Download .pdf (.09 MB) Help with pdf files

Tópico(s): Genomics and Phylogenetic Studies

2005 - Elsevier BV | Molecular & Cellular Proteomics

Artigo Acesso aberto Revisado por pares

Mahendra S. Rao,

... more subtle, and creating meaningful solutions is not trivial. An example of one such issue is the ... vectors that went into the cells and patented protocols for obtaining specific differentiated cell types (Bubela et ... centers can generate panels of lines and develop protocols to differentiate the cells. In parallel, service providers ...

Tópico(s): CRISPR and Genetic Engineering

2013 - Elsevier BV | Cell stem cell

Artigo Acesso aberto Revisado por pares

Wanpeng Xu, Yoshitaka Takahashi, Toshiki Sakashita, Tadao Iwasaki, Hiroaki Hattori, Tanihiro Yoshimoto,

... antisense oligodeoxyribonucleotides against scavenger receptor BI suggests a trivial role of this receptor (Fig.4). The reason ...

Tópico(s): Peroxisome Proliferator-Activated Receptors

2001 - Elsevier BV | Journal of Biological Chemistry

Artigo Acesso aberto Revisado por pares

Neri Niccolai, Arianna Ciutti, Ottavia Spiga, Maria Scarselli, Andrea Bernini, Luisa Bracci, Daniela Di Maro, Claudio Dalvit, Henriette Molinari, Gennaro Esposito, Piero Andrea Temussi,

... dynamics, but such a calculation is far from trivial. Apart from possible difficulties with overlap of NOEs ...

Tópico(s): Mass Spectrometry Techniques and Applications

2001 - Elsevier BV | Journal of Biological Chemistry

Artigo Acesso aberto Revisado por pares

David Megías, Amna Qureshi,

... this drawback is overcome by introducing two non-trivial improvements, paving the way for a future real- ...

Tópico(s): Chaos-based Image/Signal Encryption

2016 - Elsevier BV | Expert Systems with Applications

Artigo Acesso aberto Revisado por pares

Guillaume Celosia, Mathieu Cunche,

... severe privacy flaws. First, in addition to the trivial exposure of device characteristics and status, we found ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2020 - De Gruyter Open | Proceedings on Privacy Enhancing Technologies