Sciweavers

1080 search results - page 59 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
PE
2007
Springer
175views Optimization» more  PE 2007»
14 years 9 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 4 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
WDAG
2007
Springer
63views Algorithms» more  WDAG 2007»
15 years 4 months ago
A Formal Analysis of the Deferred Update Technique
The deferred update technique is a widely used approach for building replicated database systems. Its fame stems from the fact that read-only transactions can execute locally to a...
Rodrigo Schmidt, Fernando Pedone
IACR
2011
223views more  IACR 2011»
13 years 9 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
EUROPKI
2009
Springer
14 years 7 months ago
A Secure and Efficient Authenticated Diffie-Hellman Protocol
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary an...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...