Performance evaluation of the stream control transmission protocol transmission
protocol (SCTP) which is the basis of the SIGTRAN
protocol stack. In order to analyze SIGTRAN
The method of constructing models of peer to peer protocolsThe models of peer to peer
protocols are presented with the help of one-step processes
Some new platforms for algebraic cryptography and one method of increasing the security of constructing the cryptographic
protocols on the algebraic platforms. Under certain reasonable assumptions
Multi-party secure communication using blockchain over 5G on the Pedersen commitment and the Schnorr
protocol, this study comes up with a secure multi-party
computing Some new platforms for algebraic cryptography and one method of increasing the security of constructing the cryptographic
protocols on the algebraic platforms. Under certain reasonable assumptions
In-Depth Analysis of HARQ Performance in Active RIS-Assisted RSMA Systems employing hybrid automatic repeat request (HARQ) transmission
protocol. The numerical results indicate that
Model with threshold control for analyzing a server with an SIP protocol in the overload modeThe SIP
protocol defines the Invite messages initiating the session and the nonInvite ones, which
International requirements for integrated national pollutant release and transfer registers, introduced by the provisions of the 2003 Kiev
Protocol on PRTR to the 1998 Aarhus Convention on Access
Approaches to the security analysis of authentication and authorization protocols in distributed systems systems cryptographic
protocols and software tools implemented on the basis of these approaches has been