Sciweavers

2162 search results - page 147 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
GLOBECOM
2009
IEEE
14 years 1 months ago
Stochastic Properties and Application of City Section Mobility Model
Abstract--Node mobility has a direct impact on the performance evaluation of various network mobility protocols. Unfortunately, most of the analysis on mobility protocols used Rand...
Md. Shohrab Hossain, Mohammed Atiquzzaman
AINA
2010
IEEE
14 years 1 months ago
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...
GRC
2008
IEEE
13 years 11 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
IANDC
2008
150views more  IANDC 2008»
13 years 10 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
TWC
2008
104views more  TWC 2008»
13 years 10 months ago
Adaptive ARQ with energy efficient backoff on Markov fading links
In this letter, we are concerned with adaptive ARQ techniques combined with backoff strategies that exploit the bursty nature of wireless links for improved energy savings. Specifi...
Ananthanarayanan Chockalingam, Michele Zorzi