Sciweavers

212 search results - page 18 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
CMS
2003
171views Communications» more  CMS 2003»
14 years 11 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
IWSOS
2007
Springer
15 years 3 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
ACSW
2006
14 years 11 months ago
Modelling denial of service attacks on JFK with Meadows's cost-based framework
We present the first detailed application of Meadows's cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two ...
Jason Smith, Juan Manuel González Nieto, Co...
ICMCS
2010
IEEE
154views Multimedia» more  ICMCS 2010»
14 years 7 months ago
Minimizing delay in lossless sequential data streaming
There is an ongoing explosion of interactive Internet applications. By nature, these applications require responsive clientserver data exchange and lossless, in-order delivery. In...
Sanjeev Mehrotra, Jin Li, Ying-zong Huang
AINA
2009
IEEE
15 years 4 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu