Sciweavers

1875 search results - page 112 / 375
» Automatic Network Protocol Analysis
Sort
View
CSREASAM
2006
15 years 4 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
CADE
2011
Springer
14 years 3 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
SAC
2004
ACM
15 years 8 months ago
LEMP: Lightweight Efficient Multicast Protocol for video on demand
In this paper, we propose a new scalable application-layer protocol, specifically designed for data streaming applications with large client sets. This is based upon a control hie...
Panayotis E. Fouliras, Spiros Xanthos, Nikolaos Ts...
AINA
2009
IEEE
15 years 10 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
DISCEX
2003
IEEE
15 years 8 months ago
Interactions Between TCP and the IEEE 802.11 MAC Protocol
The IEEE 802.11x MAC protocol, the de facto standard for wireless LANs, includes a distributed coordination function (DCF) mode usable for ad hoc network architectures. The Transm...
Rui Jiang, Vikram Gupta, Chinya V. Ravishankar