Sciweavers

4761 search results - page 189 / 953
» Performance of Protocols
Sort
View
ACISP
2008
Springer
15 years 6 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
ISCAPDCS
2001
15 years 5 months ago
Comparison of Various TCP Implementations in a Congested Network
Transmission Control Protocol (TCP) in the Internet Protocol suite has become over the years the most widely used protocol for data communications. Recent developments in high-spe...
Mansoor Alam, Shravan K. Vallala, Min Song
CATS
2007
15 years 5 months ago
An Optimal Broadcasting Protocol for Mobile Video-on-Demand
The advance of wireless and mobile technology introduces a new type of Video-on-Demand (VOD) systems, namely the mobile VOD systems, that provide VOD services to mobile clients. I...
Regant Y. S. Hung, Hing-Fung Ting
JISE
2000
56views more  JISE 2000»
15 years 3 months ago
Quorum-Based Replication in Object-Based Systems
methods. If a pair of methods op1 and op2 are compatible, the summation of the quorum numbers of op1 and op2 can be smaller than the number of replicas in the QOL protocol even if ...
Katsuya Tanaka, Kyoji Hasegawa, Makoto Takizawa
136
Voted
WINET
2002
101views more  WINET 2002»
15 years 3 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...