Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

V5 interface

Known as: V5 protocol 
V5 is a family of telephone network protocols defined by ETSI which allow communications between the telephone exchange, also known in the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
2015
2015
Cloud computing is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns… Expand
  • figure 1
  • figure 2
  • figure 3
2014
2014
Cloud is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network… Expand
  • figure 1
2011
2011
This document specify how the Kerberos V5 protocol can be transported over the Transport Layer Security (TLS) protocol, to… Expand
2007
2007
Secrecy properties of network protocols assert that no probabilistic polynomial-time distinguisher can win a suitable game… Expand
  • table 2
2007
2007
We investigate inductive methods for proving secrecy properties of network protocols, in a “computational” setting applying a… Expand
2007
2007
With sigaling-analysis function of NGN tester as research background, this paper mainly describes the basic conception and… Expand
1997
1997
From the Publisher: New interfacing technology allows multiple access networks made by different manufacturers to be attached to… Expand
1993
1993
The V5 interfaces defined by ETSI have adopted a robust approach to public switched telephone network (PSTN) and integrated… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • figure 4