Sciweavers

404 search results - page 24 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
135
Voted
EUROCRYPT
2001
Springer
15 years 8 months ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
119
Voted
SPIN
1999
Springer
15 years 7 months ago
The Engineering of a Model Checker: The Gnu i-Protocol Case Study Revisited
In a recent study a series of model checkers, among which Spin [5], SMV [9], and a newer system called XMC [10], were compared on performance. The measurements used for this compar...
Gerard J. Holzmann
152
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
Fine-grained private matching for proximity-based mobile social networking
—Proximity-based mobile social networking (PMSN) refers to the social interaction among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their ...
Rui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhu...
ICPP
1998
IEEE
15 years 7 months ago
Efficient Multicast on Myrinet using Link-Level Flow Control
This paper studies the implementation of efficient multicast protocols for Myrinet, a switched, wormhole-routed, Gigabit-per-second network technology. Since Myrinet does not supp...
Raoul Bhoedjang, Tim Rühl, Henri E. Bal
128
Voted
TRIDENTCOM
2005
IEEE
15 years 9 months ago
TBI: End-to-End Network Performance Measurement Testbed for Empirical Bottleneck Detection
— Recent advances in networking include new bandwidth-intensive applications, sophisticated protocols that enable real-time data and multimedia delivery and aspects of network se...
Prasad Calyam, Dima Krymskiy, Mukundan Sridharan, ...