Sciweavers

154 search results - page 5 / 31
» Security Analysis of the MPLS Label Distribution Protocol
Sort
View
83
Voted
PERCOM
2005
ACM
15 years 9 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
ACSD
2005
IEEE
126views Hardware» more  ACSD 2005»
15 years 3 months ago
Modelling and Analysis of Distributed Simulation Protocols with Distributed Graph Transformation
This paper presents our approach to model distributed discrete event simulation systems in the framework of distributed graph transformation. We use distributed typed attributed g...
Juan de Lara, Gabriele Taentzer
OTM
2007
Springer
15 years 3 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ICNP
2002
IEEE
15 years 2 months ago
Dynamic Routing of Bandwidth Guaranteed Multicasts with Failure Backup
This paper presents a new algorithm for dynamic routing of bandwidth guaranteed multicast tunnels with failure backup. The multicast routing problem arises in many contexts such a...
Murali S. Kodialam, T. V. Lakshman