Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,732,039 papers from all fields of science
Search
Sign In
Create Free Account
V5 interface
Known as:
V5 protocol
V5 is a family of telephone network protocols defined by ETSI which allow communications between the telephone exchange, also known in the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
BT Highway
Communications protocol
OSI model
Remote concentrator
Expand
Broader (1)
Local loop
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
KERBEROS AUTHENTICATION WITH CLOUD COMPUTING ACCESS CONTROL
S. Khamitkar
,
Y. F. Al-Dubai
,
P. Bhalchandra
,
Pawan Wasnik
2015
Corpus ID: 793805
Cloud computing is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns…
Expand
2015
2015
Design of secure authentication protocol in SOCKS V5 for VPN using mobile phone
Richa Garg
,
Mayank Gupta
,
Ruhul Amin
,
Kalgi Patel
,
S. H. Islam
,
G. P. Biswas
International Conference on Trends in Automation…
2015
Corpus ID: 10090460
The Socket Secure version 5 (SOCKS V5) protocol described the password-based authentication to provide authentication services to…
Expand
2015
2015
Issues and disadvantages that prevent the native implementation of Single Sign On using Kerberos on Linux based systems
Marcelo Colombo
,
Sist Nicolas Valeije
,
Luciano Segura
CHILEAN Conference on Electrical, Electronics…
2015
Corpus ID: 17335249
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism…
Expand
2014
2014
Kerberos: Secure Single Sign-On Authentication Protocol Framework for Cloud Access Control
Y. F. Al-Dubai
,
Khamitkar S.D
2014
Corpus ID: 20743212
Cloud is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network…
Expand
2011
2011
This document specifies how the Kerberos V5 protocol can be transported over the Transport Layer Security (TLS) protocol in order to provide additional security features.
S. Josefsson
2011
Corpus ID: 62434847
Review
2010
Review
2010
Using Kerberos to secure TLS Protocol
Catargiu Raluca
,
B. Monica
International Symposium on Electronics and…
2010
Corpus ID: 32227890
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security…
Expand
2007
2007
NGN Network Analyzer: Design and Implementation Solution for Decoding and CDR Synthesis of V5 Protocol
Deng Jie
2007
Corpus ID: 64391501
With sigaling-analysis function of NGN tester as research background, this paper mainly describes the basic conception and…
Expand
2007
2007
Petri-based Modeling of the Authentication Process of Socks V5 Protocol
Wang Xuan
2007
Corpus ID: 63270352
The Socks V5 protocol is a network delegate protocol based on the client/server structure. This paper builds the model of the…
Expand
2001
2001
Study of V5 Interface Conformance Test
Zhong Yu
2001
Corpus ID: 63181641
We first introduce the concept of V5 interface and V5 protocol, development of V5 interface and merit of V5 interface;then we…
Expand
1992
1992
Interfacing access networks to exchanges-the ETSI V5 approach
A. Gillespie
[Conference Record] GLOBECOM '92 - Communications…
1992
Corpus ID: 62560514
The principles behind the new ETSI V5 interface are introduced. The model of the access network appropriate to the V5 interface…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE