Sciweavers

2699 search results - page 32 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 3 months ago
Performance Evaluation of a Metro WDM Multi-channel Ring Network with Variable-length Packets
— In this paper, we discuss and evaluate our two metro wavelength division multiplexing (WDM) ring network architectures for variable-length packet traffic. The paper begins with...
Bernardi Pranggono, Rashid Mehmood, Jaafar M. H. E...
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 2 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
SIGCOMM
2004
ACM
14 years 2 months ago
SPV: secure path vector routing for securing BGP
As our economy and critical infrastructure increasingly relies on the Internet, the insecurity of the underlying border gateway routing protocol (BGP) stands out as the Achilles h...
Yih-Chun Hu, Adrian Perrig, Marvin A. Sirbu
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi