Sciweavers

3972 search results - page 141 / 795
» Design of the iSCSI Protocol
Sort
View
EUROCRYPT
2001
Springer
15 years 8 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
SRDS
2000
IEEE
15 years 8 months ago
Performance of Mobile, Single-Object, Replication Protocols
This paper discusses the implementation and performance of bounded voting: a new object replication protocol designed for use in mobile and weakly-connected environments. We show ...
Ugur Çetintemel, Peter J. Keleher
MOBICOM
1999
ACM
15 years 8 months ago
Query Localization Techniques for On-Demand Routing Protocols in ad hoc Networks
Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in ...
Robert Castañeda, Samir Ranjan Das
SIGCOMM
1996
ACM
15 years 8 months ago
Analysis of Techniques to Improve Protocol Processing Latency
This paper describes several techniques designed to improve protocol latency, and reports on their effectiveness when measured on a modern RISC machine employing the DEC Alpha pro...
David Mosberger, Larry L. Peterson, Patrick G. Bri...
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 4 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi