Sciweavers

404 search results - page 33 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
138
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
— At the forefront of the recent advances in mobile networks is the development of sophisticated mobility management mechanisms that are usually based on Mobile IP and its deriva...
Antonios Argyriou, Vijay K. Madisetti
151
Voted
MOBIHOC
2001
ACM
16 years 3 months ago
Effects of wireless physical layer modeling in mobile ad hoc networks
In most studies on mobile ad hoc networks (MANET), simulation models are used for the evaluation of devices and protocols. Typically, such simulations focus on the specific higher...
Mineo Takai, Jay Martin, Rajive Bagrodia
137
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
133
Voted
USS
2010
15 years 1 months ago
Realization of RF Distance Bounding
One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a ...
Kasper Bonne Rasmussen, Srdjan Capkun
136
Voted
TAMC
2007
Springer
15 years 9 months ago
A Note on Universal Composable Zero Knowledge in Common Reference String Model
Pass observed that universal composable zero-knowledge (UCZK) protocols in the common reference string (CRS) model, where a common reference string is selected trustily by a truste...
Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao