Sciweavers

7329 search results - page 1277 / 1466
» Network Extractor Protocols
Sort
View
ISSS
1997
IEEE
103views Hardware» more  ISSS 1997»
15 years 8 months ago
Fast and Extensive System-Level Memory Exploration for ATM Applications
In this paper, our memory architecture exploration methodology and CAD techniques for network protocol applications are presented. Prototype tools have been implemented, and appli...
Peter Slock, Sven Wuytack, Francky Catthoor, Gjalt...
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 8 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
HPDC
1993
IEEE
15 years 8 months ago
Programming a Distributed System Using Shared Objects
Building the hardware for a high-performance distributed computer system is a lot easier than building its software. In this paper we describe a model for programtributed systems ...
Andrew S. Tanenbaum, Henri E. Bal, M. Frans Kaasho...
CCS
1993
ACM
15 years 8 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
FC
2010
Springer
191views Cryptology» more  FC 2010»
15 years 8 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg
« Prev « First page 1277 / 1466 Last » Next »