Sciweavers

3972 search results - page 71 / 795
» Design of the iSCSI Protocol
Sort
View
ICNP
2002
IEEE
14 years 2 months ago
A Multicast Transport Protocol for Cooperative Media Distribution
This paper describes the main ideas of DRMTP (Distributed Real-time Multicast Transport Protocol), an adaptive application-level protocol which allows cooperative multicast of rea...
Dimitris Vyzovitis, Andrew Lippman
ACSAC
2001
IEEE
14 years 21 days ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
ICCCN
1998
IEEE
14 years 1 months ago
Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc
We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for a...
Samir Ranjan Das, Robert Castañeda, Jiangta...
ISW
2000
Springer
14 years 19 days ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 9 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...