Sciweavers

3972 search results - page 60 / 795
» Design of the iSCSI Protocol
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
CAINE
2003
13 years 10 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
INFOCOM
2005
IEEE
14 years 2 months ago
A performance vs. cost framework for evaluating DHT design tradeoffs under churn
Abstract— Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. The...
Jinyang Li, Jeremy Stribling, Robert Morris, M. Fr...
TSP
2011
210views more  TSP 2011»
13 years 4 months ago
Physical Layer Network Coding and Precoding for the Two-Way Relay Channel in Cellular Systems
In this paper, we study the application of physical layer network coding to the joint design of uplink and downlink transmissions, where the base station and the relay have multip...
Zhiguo Ding, Ioannis Krikidis, John S. Thompson, K...
ESORICS
1998
Springer
14 years 1 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel