XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Network protocols

Articles & Features

Evolving intelligent devices for the future via named data networking

SECTION: Features

Evolving intelligent devices for the future via named data networking

As the numbers and capabilities of networked devices continue to grow, they will play an increasingly important role in daily life. Ensuring security and usability will be the first and foremost challenge; Named Data Networking can help address this challenge through localized trust, usable security, and autoconfiguration.

By Zhiyi Zhang, Edward Lu, Yu Guan, Tianxiang Li, Xinyu Ma, Zhaoning Kong, Lixia Zhang, September 2019

PDF | HTML | In the Digital Library

The case for regulating social networks and the internet

The case for regulating social networks and the internet

We don't need to miss out on the joys of technology in order to regain what liberty and democracy are supposed to mean, but the regulatory transformation we need is of epic proportions.

By carlo von lynX, July 2018

PDF | HTML | In the Digital Library

Global synchronization and the challenges of building network awareness

FEATURE: Features

Global synchronization and the challenges of building network awareness

The Internet of Things places new demands on wireless networks that cannot be met with conventional infrastructure, services, and protocols. But there is hope, specifically a new paradigm to enable wireless awareness through global synchronization.

By Alyssa B. Apsel, Enkhbayasgalan Gantsog, December 2015

PDF | HTML | In the Digital Library

IP addresses

DEPARTMENT: Back

IP addresses

By Finn Kuusisto, December 2015

PDF | HTML | In the Digital Library

Composing on-demand intelligent PHYsical layers

SECTION: Features

Composing on-demand intelligent PHYsical layers

In the future, our radio devices will adapt to deal with new types of signals. The challenge is to describe those signals so that devices can learn from one another and communicate.

By Aveek Dutta, Dola Saha, March 2014

PDF | HTML | In the Digital Library

Recent ideas for circumventing internet filtering

Recent ideas for circumventing internet filtering

Technical solutions can provide a skeleton key to unlocking the Internet.

By Dan Boneh, December 2011

PDF | HTML | In the Digital Library

Game-state fidelity across distributed interactive games

By Aaron McCoy, Declan Delaney, Tomas Ward, October 2005

PDF | HTML | In the Digital Library

Experimental mobile gateways

By Premshree Pillai, August 2005

PDF | HTML | In the Digital Library

Bluetooth

By Myra Dideles, June 2003

PDF | HTML | In the Digital Library

Mobile IP

By Debalina Ghosh, December 2000

PDF | HTML | In the Digital Library

Service discovery in the future for mobile commerce

By Dipanjan Chakraborty, Harry Chen, December 2000

PDF | HTML | In the Digital Library

Charlotte

By Stuart Patterson, June 2000

PDF | HTML | In the Digital Library

Introduction to Linux networking and security

By Wei-Mei Shyr, Brian Borowski, September 1999

PDF | HTML | In the Digital Library

Electronic voting

By Lorrie Faith Cranor, April 1996

PDF | HTML | In the Digital Library

Mutual authenticating protocol with key distribution in client/server environment

The explosive growth of networked and internetworked computer systems during the past decade has brought about a need for increased protection mechanisms. This paper discusses three authentication protocols that incorporate the use of methods that present effective user authentication. The first two protocols have been previously discussed in the literature; the third protocol draws from the first two and others to produce an authentication scheme that provides both mutual authentication and secure key distribution which is easy to use, is compatible with present operating systems, is transparent across systems, and provides password file protection.

By Charles Cavaiani, Jim Alves-Foss, April 1996

PDF | HTML | In the Digital Library

Networking: introduction

By Mark Allman, September 1995

PDF | HTML | In the Digital Library

Harvest

By Sarah Elizabeth Burcham, September 1995

PDF | HTML | In the Digital Library

The Fox Project

By Jeremy Buhler, September 1995

PDF | HTML | In the Digital Library

Under the hood of the Internet

By Jason Yanowitz, September 1994

PDF | HTML | In the Digital Library