Sciweavers

94 search results - page 12 / 19
» Experimental Analysis of the Arcanum Key Exchange Protocol
Sort
View
IWCM
2004
Springer
14 years 29 days ago
Complex Motion in Environmental Physics and Live Sciences
Abstract Image sequence processing techniques are an essential tool for the experimental investigation of dynamical processes such as exchange, growth, and transport processes. The...
Bernd Jähne
WECWIS
2007
IEEE
148views ECommerce» more  WECWIS 2007»
14 years 1 months ago
The Core and Shapley Value Analysis for Cooperative Formation of Procurement Networks
Formation of high value procurement networks involves a bottom-up assembly of complex production, assembly, and exchange relationships through supplier selection and contracting d...
T. S. Chandrashekar, Y. Narahari

Publication
117views
13 years 3 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
CSFW
2007
IEEE
14 years 1 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
JCIT
2010
197views more  JCIT 2010»
13 years 2 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour