Sciweavers

4305 search results - page 295 / 861
» Analysing Protocol Implementations
Sort
View
113
Voted
SCN
2010
Springer
122views Communications» more  SCN 2010»
15 years 1 months ago
A New Security Model for Authenticated Key Agreement
The Canetti–Krawczyk (CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for key agreement protocols. We discuss security s...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
162
Voted
ERSA
2010
115views Hardware» more  ERSA 2010»
15 years 20 days ago
Towards Adaptive Networking for Embedded Devices based on Reconfigurable Hardware
Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing...
Enno Lübbers, Marco Platzner, Christian Pless...
163
Voted
FORTE
2011
14 years 6 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
142
Voted
RTAS
2011
IEEE
14 years 5 months ago
Resource Sharing in GPU-Accelerated Windowing Systems
Recent windowing systems allow graphics applications to directly access the graphics processing unit (GPU) for fast rendering. However, application tasks that render frames on the...
Shinpei Kato, Karthik Lakshmanan, Yutaka Ishikawa,...
117
Voted
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 2 months ago
Unveiling the Content-Centric Features of TCP
—Content-centric networking has been proposed as a new networking paradigm that is centered around the distribution of content. A key idea of content-centric networks is to addre...
Suman Srinivasan, Ivica Rimac, Volker Hilt, Moritz...