There is strong evidence that the current implementation of TCP will perform poorly in future high speed networks. To address this problem many congestion control protocols have b...
Marios Lestas, Andreas Pitsillides, Petros A. Ioan...
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
A federation community is a group of federations working together to achieve a common goal. With a federation community, a large-scale simulation can be built using existing simul...
Wentong Cai, Guangya Li, Stephen John Turner, Bu-S...
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems...
Tien Tuan Anh Dinh, Georgios K. Theodoropoulos, Ro...
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...