Sciweavers

4305 search results - page 20 / 861
» Analysing Protocol Implementations
Sort
View
ASIASIM
2004
Springer
14 years 2 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
IPPS
2009
IEEE
14 years 3 months ago
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol
—We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication protocol for RFID environments called SLMAP, and analyse its implications...
Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro...
CSREASAM
2007
13 years 10 months ago
A PDA Implementation of an Off-line e-Cash Protocol
— We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance betw...
Efrén Clemente-Cuervo, Francisco Rodr&iacut...
COMSWARE
2008
IEEE
14 years 3 months ago
Implementation aspects of reliable transport protocols in wireless sensor networks
Abstract—Our previous study comparing analytically a comprehensive set of reliable data streaming protocols has shown that an hybrid protocol comprising stop-and-wait hop-by-hop ...
Tuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi R...
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 3 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang