Sciweavers

5324 search results - page 196 / 1065
» Internet Security Protocols
Sort
View
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 8 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
PACT
2005
Springer
15 years 10 months ago
On Evaluating the Performance of Security Protocols
Abstract. We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign...
Chiara Bodei, Mikael Buchholtz, Michele Curti, Pie...
IJSN
2007
120views more  IJSN 2007»
15 years 4 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
MSWIM
2005
ACM
15 years 10 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
ATAL
2006
Springer
15 years 8 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski