2009 Eighth International Symposium on Parallel and Distributed Computing 2009
DOI: 10.1109/ispdc.2009.29
|View full text |Cite
|
Sign up to set email alerts
|

TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The core protocols of the TCP/IP protocol are the transport layer protocol (TCP and UDP) and the network layer protocol (IP), which are usually implemented in the kernel of the operating system. Because the purpose of TCP is to achieve reliable data transmission, it has a set of handshake mechanism, send -confirmation, timeout -resend [35]. In the case of video streaming, the network spending of TCP transmission is too large, thus impairing image quality and latency.…”
Section: Modellingmentioning
confidence: 99%
“…The core protocols of the TCP/IP protocol are the transport layer protocol (TCP and UDP) and the network layer protocol (IP), which are usually implemented in the kernel of the operating system. Because the purpose of TCP is to achieve reliable data transmission, it has a set of handshake mechanism, send -confirmation, timeout -resend [35]. In the case of video streaming, the network spending of TCP transmission is too large, thus impairing image quality and latency.…”
Section: Modellingmentioning
confidence: 99%