Sciweavers

2699 search results - page 51 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
IPL
2010
93views more  IPL 2010»
14 years 10 months ago
Compiling and securing cryptographic protocols
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Yannick Chevalier, Michaël Rusinowitch
SIGCOMM
1995
ACM
15 years 3 months ago
Design, Implementation, and Evaluation of a Software-Based Real-Time Ethernet Protocol
Distributedmultimedia applicationsrequire performanceguarantees from the underlying network subsystem. Ethernet has been the dominant local area network architecture in the last d...
Chitra Venkatramani, Tzi-cker Chiueh
MOBICOM
2004
ACM
15 years 5 months ago
Performance optimizations for wireless wide-area networks: comparative study and experimental evaluation
We present a comparative performance study of a wide selection of optimization techniques to enhance application performance in the context of wide-area wireless networks (WWANs)....
Rajiv Chakravorty, Suman Banerjee, Pablo Rodriguez...
CSFW
2009
IEEE
15 years 6 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
MIDDLEWARE
2004
Springer
15 years 5 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...