Sciweavers

537 search results - page 22 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
WISE
2005
Springer
15 years 3 months ago
Asynchronous Web Services Communication Patterns in Business Protocols
Asynchronous interactions are becoming more and more important in the realization of complex B2B Web applications, and Web services are at the moment the most innovative and well-e...
Marco Brambilla, Giuseppe Guglielmetti, Christina ...
ISCAS
2007
IEEE
92views Hardware» more  ISCAS 2007»
15 years 4 months ago
A Study on Impact of Leakage Current on Dynamic Power
— Scaling of CMOS technologies has led to dramatic increase in sub-threshold, gate and reverse biased junction band-to-band-tunneling (BTBT) leakage. Leakage current has now beco...
Ashesh Rastogi, Kunal P. Ganeshpure, Sandip Kundu
INFOCOM
2006
IEEE
15 years 3 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
INFOCOM
2005
IEEE
15 years 3 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
ACSAC
2009
IEEE
15 years 4 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...