Sciweavers

537 search results - page 9 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
IPPS
2003
IEEE
14 years 4 months ago
An Extended Link Reversal Protocol in Dynamic Networks
— We consider the problem of maintaining routing paths between nodes in a dynamic network. Gafni and Bertsekas proposed a link reversal approach called the BG method that maintai...
Jie Wu, Fei Dai
JNSM
2010
110views more  JNSM 2010»
13 years 5 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
SPIN
1999
Springer
14 years 3 months ago
The Engineering of a Model Checker: The Gnu i-Protocol Case Study Revisited
In a recent study a series of model checkers, among which Spin [5], SMV [9], and a newer system called XMC [10], were compared on performance. The measurements used for this compar...
Gerard J. Holzmann
ENTCS
2002
111views more  ENTCS 2002»
13 years 10 months ago
Comparing Meseguer's Rewriting Logic with the Logic CRWL
Meseguer's rewriting logic and the rewriting logic CRWL are two well-known approaches to rewriting as logical deduction that, despite some clear similarities, were designed w...
Miguel Palomino Tarjuelo
SOUPS
2009
ACM
14 years 5 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe