Sciweavers

849 search results - page 44 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
ADHOC
2007
67views more  ADHOC 2007»
13 years 7 months ago
Threshold-related throughput - A new criterion for evaluation of sensor network performance
Energy efficient and power aware protocols are of utmost importance in Sensor Networks. The most popular criteria, so far, for evaluating performance of energy-aware protocols are...
Ilya Ledvich, Adrian Segall
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
14 years 9 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu
ISW
2000
Springer
13 years 11 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
INFOCOM
1999
IEEE
13 years 12 months ago
Scalability Evaluation of Multi-Protocol Over ATM (MPOA)
Multi-Protocol over ATM (MPOA) is being considered by the industry as an important short-cut technology that provides an efficient transfer of inter-subnet unicast data in a LANE ...
Indra Widjaja, Haining Wang, Steven Wright, Amalen...