Sciweavers

981 search results - page 54 / 197
» A Performance Analysis of the iSCSI Protocol
Sort
View
CCS
2001
ACM
15 years 3 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ADHOC
2005
134views more  ADHOC 2005»
14 years 11 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
JOC
2011
157views more  JOC 2011»
14 years 6 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
ICNP
2007
IEEE
15 years 5 months ago
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations
— TCP is the dominant transport protocol used in the Internet and its performance fundamentally governs the performance of Internet applications. It is well-known that packet los...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith
TII
2008
176views more  TII 2008»
14 years 11 months ago
Adaptive Multilevel Code Update Protocol for Real-Time Sensor Operating Systems
In wireless sensor networks each sensor node has very limited resources, and it is very difficult to find and collect them. For this reason, updating or adding programs in sensor n...
Sangho Yi, Hong Min, Yookun Cho, Jiman Hong