Sciweavers

1875 search results - page 43 / 375
» Automatic Network Protocol Analysis
Sort
View
CSREASAM
2004
13 years 11 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
CCS
2008
ACM
13 years 12 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
SIGCOMM
1996
ACM
14 years 2 months ago
Analysis of Techniques to Improve Protocol Processing Latency
This paper describes several techniques designed to improve protocol latency, and reports on their effectiveness when measured on a modern RISC machine employing the DEC Alpha pro...
David Mosberger, Larry L. Peterson, Patrick G. Bri...
CDC
2008
IEEE
118views Control Systems» more  CDC 2008»
14 years 4 months ago
Congestion control for small queues: Analysis and evaluation of a new protocol
— A new congestion control protocol is presented, analyzed and experimentally evaluated. It consists of the standard inner-loop ACK-clock and a novel outer-loop adjusting the win...
Niels Möller, Karl Henrik Johansson
USENIX
1993
13 years 11 months ago
Measurement, Analysis, and Improvement of UDP/IP Throughput for the DECstation 5000
Networking software is a growing bottleneck in modern workstations, particularly for high throughput applications such as networked digital video. We measure various components of...
Jonathan Kay, Joseph Pasquale