Sciweavers

4761 search results - page 82 / 953
» Performance of Protocols
Sort
View
117
Voted
TISSEC
2010
115views more  TISSEC 2010»
14 years 10 months ago
A Simple and Generic Construction of Authenticated Encryption with Associated Data
We revisit the problem of constructing a protocol for performing authenticated encryption with associated data (AEAD). A technique is described which combines a collision resistant...
Palash Sarkar
117
Voted
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 3 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
HPDC
1997
IEEE
15 years 7 months ago
Optimizing Layered Communication Protocols
Layering of protocols o ers several well-known advantages, but typically leads to performance ine ciencies. We present a model for layering, and point out where the performance pr...
Mark Hayden, Robbert van Renesse
ISCC
2005
IEEE
15 years 9 months ago
The Impact of Network and Protocol Heterogeneity on Real-Time Application QoS
We evaluate the impact of network, and protocol heterogeneity on real-time application performance. We focus on TCP and UDP supportive role, also in the context of network stabili...
Panagiotis Papadimitriou, Vassilis Tsaoussidis, So...
137
Voted
EUROCRYPT
2006
Springer
15 years 7 months ago
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll ...
Tal Moran, Moni Naor