Sciweavers

1342 search results - page 220 / 269
» Attacks are Protocols Too
Sort
View
FSTTCS
2007
Springer
15 years 8 months ago
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Abstract. The abstraction of cryptographic operations by term algebras, called DolevYao models or symbolic cryptography, is essential in almost all tool-supported methods for provi...
Michael Backes, Markus Dürmuth, Ralf Küs...
CLUSTER
2006
IEEE
15 years 8 months ago
Initial Performance Evaluation of the NetEffect 10 Gigabit iWARP Adapter
Interconnect speeds currently surpass the abilities of today’s processors to satisfy their demands. The throughput rate provided by the network simply generates too much protoco...
Dennis Dalessandro, Pete Wyckoff, Gary Montry
GLOBECOM
2006
IEEE
15 years 8 months ago
Further Analysis of XCP Equilibrium Performance
— Low analyzes the equilibrium performance of the recently developed eXplicit Control Protocol (XCP) by applying the derived window-based dynamical model. However, Low’s window...
Peng Wang, David L. Mills
INFOCOM
2006
IEEE
15 years 8 months ago
TCP Internal Buffers Optimization for Fast Long-Distance Links
— In recent years, issues regarding the behavior of TCP in high-speed and long-distance networks have been extensively addressed in the networking research community, both becaus...
Andrea Baiocchi, Saverio Mascolo, Francesco Vacirc...
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
15 years 8 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke