Sciweavers

1777 search results - page 176 / 356
» Programming Cryptographic Protocols
Sort
View
CADE
2008
Springer
16 years 1 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
SPW
1999
Springer
15 years 5 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
IFIP
2003
Springer
15 years 6 months ago
Towards a Novel Transport Protocol for Ad Hoc Networks
The TCP protocol exhibits poor performance in multi-hop Mobile Ad Hoc Networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly different way from ...
Giuseppe Anastasi, Andrea Passarella
MOBIHOC
2003
ACM
16 years 29 days ago
SHARP: a hybrid adaptive routing protocol for mobile ad hoc networks
A central challenge in ad hoc networks is the design of routing protocols that can adapt their behavior to frequent and rapid changes in the network. The performance of proactive ...
Venugopalan Ramasubramanian, Zygmunt J. Haas, Emin...
SAC
2009
ACM
15 years 8 months ago
Specifying and checking protocols of multithreaded classes
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
Clément Hurlin