Sciweavers

2065 search results - page 8 / 413
» 10 Networking Papers: readings for protocol design
Sort
View
CSFW
2002
IEEE
14 years 9 days ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
JCM
2006
129views more  JCM 2006»
13 years 7 months ago
T-ANT: A Nature-Inspired Data Gathering Protocol for Wireless Sensor Networks
There are many difficult challenges ahead in the design of an energy-efficient communication stack for wireless sensor networks. Due to the severe sensor node constraints, protocol...
S. Selvakennedy, Sukunesan Sinnappan, Yi Shang
JSAC
2008
110views more  JSAC 2008»
13 years 7 months ago
Designing Multicast Protocols for Non-Cooperative Networks
Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
AINA
2009
IEEE
13 years 5 months ago
Evaluating the Performance of Network Protocol Processing on Multi-core Systems
Improvements at the physical network layer have enabled technologies such as 10 Gigabit Ethernet. Single core end-systems are unable to fully utilise these networks, due to limite...
Matthew Faulkner, Andrew Brampton, Stephen Pink
CEAS
2005
Springer
13 years 9 months ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...