This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
— A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, m...
Cesar A. Santivanez, A. Bruce McDonald, Ioannis St...
Abstract— Traditionally, reliable multicast protocols are deterministic in nature. It is precisely this determinism that tends to become their limiting factor when aiming at reli...