Sciweavers

1612 search results - page 108 / 323
» About models of security protocols
Sort
View
EJWCN
2010
156views more  EJWCN 2010»
14 years 11 months ago
On Performance Modeling of Ad Hoc Routing Protocols
Simulation studies have been the predominant method of evaluating ad hoc routing algorithms. Despite their wide use and merits, simulations are generally time consuming. Furthermo...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
ANSS
2000
IEEE
15 years 8 months ago
IRLSim: A General Purpose Packet Level Network Simulator
Simulation is the main tool for studying networking protocols before deploying them in a wide scale, or for understanding how they are expected to behave under various conditions....
Andreas Terzis, Konstantinos Nikoloudakis, Lan Wan...
TIFS
2010
130views more  TIFS 2010»
14 years 10 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena

Lecture Notes
773views
17 years 2 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
15 years 10 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...