Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,179,485 papers from all fields of science
Search
Sign In
Create Free Account
V5 interface
Known as:
V5 protocol
V5 is a family of telephone network protocols defined by ETSI which allow communications between the telephone exchange, also known in the…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
8 relations
BT Highway
Communications protocol
OSI model
Remote concentrator
Expand
Broader (1)
Local loop
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Design of secure authentication protocol in SOCKS V5 for VPN using mobile phone
Richa Garg
,
Mayank Gupta
,
Ruhul Amin
,
Kalgi Patel
,
S. H. Islam
,
G. P. Biswas
International Conference on Trends in Automation…
2015
Corpus ID: 10090460
The Socket Secure version 5 (SOCKS V5) protocol described the password-based authentication to provide authentication services to…
Expand
2015
2015
KERBEROS AUTHENTICATION WITH CLOUD COMPUTING ACCESS CONTROL
S. Khamitkar
,
Y. F. Al-Dubai
,
P. Bhalchandra
,
Pawan Wasnik
2015
Corpus ID: 793805
Cloud computing is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns…
Expand
2015
2015
Issues and disadvantages that prevent the native implementation of Single Sign On using Kerberos on Linux based systems
Marcelo Colombo
,
Sist Nicolas Valeije
,
Luciano Segura
CHILEAN Conference on Electrical, Electronics…
2015
Corpus ID: 17335249
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism…
Expand
2014
2014
Kerberos: Secure Single Sign-On Authentication Protocol Framework for Cloud Access Control
Y. F. Al-Dubai
,
Khamitkar S.D
2014
Corpus ID: 20743212
Cloud is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network…
Expand
Highly Cited
2011
Highly Cited
2011
Using Kerberos Version 5 over the Transport Layer Security (TLS) Protocol
S. Josefsson
RFC
2011
Corpus ID: 5833887
This document specify how the Kerberos V5 protocol can be transported over the Transport Layer Security (TLS) protocol, to…
Expand
2007
2007
Inductive Proofs of Computational Secrecy
Arnab Roy
,
Anupam Datta
,
Ante Derek
,
John C. Mitchell
ESORICS
2007
Corpus ID: 8598556
Secrecy properties of network protocols assert that no probabilistic polynomial-time distinguisher can win a suitable game…
Expand
2007
2007
NGN Network Analyzer: Design and Implementation Solution for Decoding and CDR Synthesis of V5 Protocol
Deng Jie
2007
Corpus ID: 64391501
With sigaling-analysis function of NGN tester as research background, this paper mainly describes the basic conception and…
Expand
2001
2001
Study of V5 Interface Conformance Test
Zhong Yu
2001
Corpus ID: 63181641
We first introduce the concept of V5 interface and V5 protocol, development of V5 interface and merit of V5 interface;then we…
Expand
1997
1997
Access Networks Technology and V5 Interfacing
A. Gillespie
1997
Corpus ID: 57232528
From the Publisher: New interfacing technology allows multiple access networks made by different manufacturers to be attached to…
Expand
1993
1993
Towards a global V5 interface
K. James
,
A. Gillespie
Proceedings of ICC '93 - IEEE International…
1993
Corpus ID: 60769898
The V5 interfaces defined by ETSI have adopted a robust approach to public switched telephone network (PSTN) and integrated…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE