Sciweavers

1080 search results - page 16 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
IWCMC
2009
ACM
15 years 4 months ago
Carrier sense multiple access with enhanced collision avoidance: a performance analysis
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a recently proposed modification to the well-known CSMA/CA protocol. By using a determinis...
Jaume Barceló, Boris Bellalta, Cristina Can...
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 3 months ago
IPSec: Performance Analysis and Enhancements
Abstract— Internet Protocol Security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). In previous work, we examined the overheads incurred...
Craig A. Shue, Minaxi Gupta, Steven A. Myers
ICDCS
2002
IEEE
15 years 2 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 3 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
STACS
2007
Springer
15 years 3 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung