14.2 C
Munich
Sunday, September 19, 2021
- Advertisement -
- Advertisement -spot_img

AUTHOR NAME

alfi_an

15 POSTS
0 COMMENTS

IKE and ISAKMP

Internet Key Exchange and the Internet Security Association and Key Management Protocol were designed to allow crypto endpoints to dynamically exchange keys and negotiate security associations....

Mixed-Reality-Based Role-Playing-Games Concept

I. INTRODUCTION The presence of new innovations in the field of technology such as mixed reality is expected to be a tool that facilitates...

Embedded System

The more time passes, the more diverse forms of technological innovation. Technology basically exists in human life as the role of facilitating, overcoming, helping, and...

OSI LAYER & TCP/IP

OSI LAYER MODEL               The OSI model is not a protocol. The OSI model is used to explain the workings of the computer network logically. In general, the...

C – PROGRAMMING LANGUAGE

C language is one of the programming language that initially developed by Dennis Ritchie between 1969 and 1973. C is a high-level language that was originally...

Latest news

- Advertisement -spot_img