Sciweavers

981 search results - page 37 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
ESORICS
2003
Springer
15 years 4 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
114
Voted
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 10 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
WCNC
2010
IEEE
15 years 3 months ago
Throughput Analysis for Cooperation in Random Access Networks
—This paper aims at answering the questions of how to enable cooperative communications in random access networks. And, since cooperation introduces extra transmissions in the ch...
Amr El-Sherif, K. J. Ray Liu
ICMCS
2005
IEEE
98views Multimedia» more  ICMCS 2005»
15 years 4 months ago
Performance Studio of Multicast Video Streaming Using SRMSH
With the increasing deployment of multimedia real-time Internet applications, evaluating transport protocol metrics of Quality of Service (QoS) has gained rapidly increasing impor...
Oscar Martínez Bonastre, C. P. Salvador
ICCCN
2007
IEEE
15 years 5 months ago
Transport Protocols for Remote Programming of Network Robots within the context of Telelaboratories for Education: A Comparative
– Within the context of Tele-Laboratories for Education the use of the Internet as communication media permits any researcher/student to perform remote experiments in a simple an...
Raul Wirz, Raúl Marín, José M...