14 downloads
34 views

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.3441v1
38 downloads
118 views

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.3322v1
182 downloads
1,111 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.3194v2
101 downloads
154 views

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.2998v1
91 downloads
201 views

Transferring a huge amount of data between different network locations over the network links depends on the heterogeneous wireless network. Such a network consists of several networks with different access technologies. Traditionally, a mobile device may be moved...

["Computer Networks and Communications","Mobile and Ubiquitous Computing","Network Science and Online Social Networks"]
doi:10.7287/peerj.preprints.2970v1
1 citation
995 downloads
1,570 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.114
722 downloads
3,186 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human\u2013Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.112
316 downloads
1,613 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human-Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2648v2
234 downloads
1,043 views

"Publication forms the core structure supporting the development and transmission of scientific knowledge" (Galbraith2015). Yet, with the WorldWideWeb a dominant part of current scientific publication and information-dissemination, internet "publication" is still...

["Adaptive and Self-Organizing Systems","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1568v13
3,511 downloads
2,015 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1241v2
219 downloads
965 views

In this paper, we introduce a framework for implementing deep copy on top of MPI. The process is initiated by passing just the root object of the dynamic data structure. Our framework takes care of all pointer traversal, communication, copying and reconstruction...

["Computer Networks and Communications","Distributed and Parallel Computing","Programming Languages"]
doi:10.7717/peerj-cs.95
1 citation
280 downloads
1,453 views

In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition and...

["Computer Networks and Communications"]
doi:10.7717/peerj-cs.98
107 downloads
343 views

In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition and...

["Computer Networks and Communications"]
doi:10.7287/peerj.preprints.2477v3
56 downloads
168 views

This paper introduces a renewed gateway to ENEAGRID distributed computing resources, named Fast Access to Remote Objects 2.0 (FARO 2.0). FARO 2.0 is a tool for application and desktop virtualization with a strong focus towards user experience (UX), providing trained...

["Human-Computer Interaction","Computer Networks and Communications","Distributed and Parallel Computing","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2537v1
178 downloads
813 views

Opportunistic data forwarding significantly increases the throughput in multi-hop wireless mesh networks by utilizing the broadcast nature of wireless transmissions and the fluctuation of link qualities. Network coding strengthens the robustness of data transmissions...

["Computer Networks and Communications","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.89

Top subject areas - Articles & Preprints

Top subject areas - People

View all subject areas