Sciweavers

4761 search results - page 83 / 953
» Performance of Protocols
Sort
View
ASIACRYPT
2000
Springer
15 years 7 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
114
Voted
PPOPP
1997
ACM
15 years 7 months ago
The Interaction of Parallel Programming Constructs and Coherence Protocols
Some of the most common parallel programming idioms include locks, barriers, and reduction operations. The interaction of these programming idioms with the multiprocessor's c...
Ricardo Bianchini, Enrique V. Carrera, Leonidas I....
120
Voted
CONCUR
2005
Springer
15 years 9 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
146
Voted
TCOM
2010
168views more  TCOM 2010»
14 years 10 months ago
A unified analysis of routing protocols in MANETs
This paper presents a mathematical framework for the evaluation of the performance of proactive and reactive routing protocols in mobile ad hoc networks (MANETs). This unified fram...
Hui Xu, Xianren Wu, Hamid R. Sadjadpour, J. J. Gar...
126
Voted
TPDS
2002
118views more  TPDS 2002»
15 years 3 months ago
A Study of Adaptive Forward Error Correction for Wireless Collaborative Computing
This paper addresses the problem of reliably multicasting Web resources across wireless local area networks (WLANs) in support of collaborative computing applications. An adaptive ...
Philip K. McKinley, Chiping Tang, Arun P. Mani