Sciweavers

3972 search results - page 44 / 795
» Design of the iSCSI Protocol
Sort
View
JCM
2006
126views more  JCM 2006»
13 years 9 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
WWW
2002
ACM
14 years 9 months ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
INFOCOM
2008
IEEE
14 years 3 months ago
On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks
— Load factor based congestion control schemes have shown to enhance network performance, in terms of utilization, packet loss and delay. In these schemes, using more accurate re...
Ihsan A. Qazi, Taieb Znati
ISPA
2004
Springer
14 years 2 months ago
A Fault Tolerance Protocol for Uploads: Design and Evaluation
This paper investigates fault tolerance issues in Bistro, a wide area upload architecture. In Bistro, clients first upload their data to intermediaries, known as bistros. A destin...
Leslie Cheung, Cheng-Fu Chou, Leana Golubchik, Yan...
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
14 years 1 months ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...