Sciweavers

404 search results - page 26 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
DEXA
2009
Springer
127views Database» more  DEXA 2009»
15 years 10 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
140
Voted
CN
2007
117views more  CN 2007»
15 years 3 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 3 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
JSAC
2006
100views more  JSAC 2006»
15 years 3 months ago
Measuring and Improving the Performance of Network Mobility Management in IPv6 Networks
Measuring the performance of an implementation of a set of protocols and analyzing the results is crucial to understanding the performance and limitations of the protocols in a rea...
Henrik Petander, Eranga Perera, Kun-Chan Lan, Arun...
ICDCS
1996
IEEE
15 years 7 months ago
The Relative Importance of Concurrent Writers and Weak Consistency Models
This paper presents a detailed comparison of the relative importance of allowing concurrent writers versus the choice of the underlying consistency model. Our comparison is based ...
Peter J. Keleher