Skip to search formSkip to main contentSkip to account menu

V5 interface

Known as: V5 protocol 
V5 is a family of telephone network protocols defined by ETSI which allow communications between the telephone exchange, also known in the… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The Socket Secure version 5 (SOCKS V5) protocol described the password-based authentication to provide authentication services to… 
2015
2015
Cloud computing is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns… 
2015
2015
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism… 
2014
2014
Cloud is a relatively new concept, so it is unsurprising that the security of information and data Protection concerns, network… 
Highly Cited
2011
Highly Cited
2011
This document specify how the Kerberos V5 protocol can be transported over the Transport Layer Security (TLS) protocol, to… 
2007
2007
Secrecy properties of network protocols assert that no probabilistic polynomial-time distinguisher can win a suitable game… 
2007
2007
With sigaling-analysis function of NGN tester as research background, this paper mainly describes the basic conception and… 
2001
2001
We first introduce the concept of V5 interface and V5 protocol, development of V5 interface and merit of V5 interface;then we… 
1997
1997
From the Publisher: New interfacing technology allows multiple access networks made by different manufacturers to be attached to… 
1993
1993
The V5 interfaces defined by ETSI have adopted a robust approach to public switched telephone network (PSTN) and integrated…