Sciweavers

3972 search results - page 110 / 795
» Design of the iSCSI Protocol
Sort
View
CRYPTO
1995
Springer
101views Cryptology» more  CRYPTO 1995»
14 years 1 months ago
Robustness Principles for Public Key Protocols
Abstract: We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help at...
Ross J. Anderson, Roger M. Needham
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 4 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
AINA
2007
IEEE
14 years 4 months ago
A Testbed with a Practical Smart Antenna for Directional MAC Protocols in Ad hoc Networks
Recently, several MAC protocols using directional antennas have been proposed for ad hoc networks, which are mainly evaluated by computer simulations. This paper develops a MAC pr...
Hikaru Mitsuhashi, Masahiro Watanabe, Sadao Obana,...
ISPEC
2007
Springer
14 years 4 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
TOOLS
1999
IEEE
14 years 2 months ago
Bounding Component Behavior via Protocols
In this paper we enhance the SOFA Component Description Language with a semantic description of a component's functionality. There are two key requirements this description a...
Frantisek Plasil, Milos Besta, Stanislav Visnovsky