Sciweavers

7329 search results - page 29 / 1466
» Network Extractor Protocols
Sort
View
ICNP
2006
IEEE
14 years 4 months ago
Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of ÐÓ Ò protocols for assigning symmetric keys to Ò processes in a network so that each process can use its assigned keys to communicate securely with eve...
Amitanand S. Aiyer, Lorenzo Alvisi, Mohamed G. Gou...
RAID
2010
Springer
13 years 8 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
COMCOM
2000
57views more  COMCOM 2000»
13 years 10 months ago
A distance-vector routing protocol for networks with unidirectional links
We proposea simple distance-vectorprotocolfor routingin networkshavingunidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in...
Francis Chi-Moon Lau, Guihai Chen, Hao Huang, Li X...
GLOBECOM
2008
IEEE
13 years 11 months ago
A Framework for Dual-Agent MANET Routing Protocols
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
Brian L. Gaines, Mahalingam Ramkumar
ANSS
2000
IEEE
14 years 2 months ago
IRLSim: A General Purpose Packet Level Network Simulator
Simulation is the main tool for studying networking protocols before deploying them in a wide scale, or for understanding how they are expected to behave under various conditions....
Andreas Terzis, Konstantinos Nikoloudakis, Lan Wan...