Sciweavers

2162 search results - page 44 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
13 years 3 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TWC
2008
106views more  TWC 2008»
13 years 8 months ago
Cooperative communications protocol for multiuser OFDM networks
This paper proposes a relay-based scheme where a fixed number of relays are utilized to design an OFDM cooperative protocol. By exploiting limited feedback from the destination ter...
W. Pam Siriwongpairat, Ahmed K. Sadek, K. J. Ray L...
IACR
2011
182views more  IACR 2011»
12 years 8 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
USENIX
1993
13 years 10 months ago
Measurement, Analysis, and Improvement of UDP/IP Throughput for the DECstation 5000
Networking software is a growing bottleneck in modern workstations, particularly for high throughput applications such as networked digital video. We measure various components of...
Jonathan Kay, Joseph Pasquale
COMCOM
2002
99views more  COMCOM 2002»
13 years 8 months ago
TCP performance analysis and optimization over DMT based ADSL system
This paper studies the transmission control protocol (TCP) performance over a discrete multi-tone (DMT) based asymmetric digital subscriber loop (ADSL) network. The impact of DMT ...
Xiaoning He, Hao Che