Sciweavers

27 search results - page 4 / 6
» A Class-Chest for Deriving Transport Protocols
Sort
View
ASIACRYPT
2008
Springer
13 years 9 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 2 months ago
Fast Power Control for Cross-Layer Optimal Resource Allocation in DS-CDMA Wireless Networks
—This paper presents a novel cross-layer design for joint power and end-to-end rate control optimization in DSCDMA wireless networks, along with a detailed implementation and eva...
Marco Belleschi, Lapo Balucanti, Pablo Soldati, Mi...
LCN
2005
IEEE
14 years 1 months ago
Achieving Scalable Capacity in Wireless Networks with Adaptive Power Control
— The seminar work of Gupta and Kumar [1] showed that multi-hop wireless networks with capacity scalable with the number of nodes, n, are achievable in theory. The transport capa...
Ivan Wang Hei Ho, Soung Chang Liew
IJISEC
2011
71views more  IJISEC 2011»
12 years 11 months ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...
TMC
2008
112views more  TMC 2008»
13 years 7 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori