Sciweavers

2699 search results - page 45 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
ESORICS
2003
Springer
14 years 2 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
IMSA
2001
132views Multimedia» more  IMSA 2001»
13 years 10 months ago
Performance of Zebra Routing Software
Zebra is publicly available free routing software that is distributed under GNU General Public License. It supports the following IP routing protocols: BGP-4, RIPv1, RIPv2 and OSP...
R. Fatoohi, R. Singh
ICPADS
2005
IEEE
14 years 2 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
CCGRID
2008
IEEE
14 years 3 months ago
A Performance Study of Secure Data Mining on the Cell Processor
— This paper examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the p...
Hong Wang 0006, Hiroyuki Takizawa, Hiroaki Kobayas...
OOPSLA
1992
Springer
14 years 27 days ago
A Comparative Performance Evaluation of Write Barrier Implementations
Generational garbage collectors are able to achieve very small pause times by concentrating on the youngest (most recently allocated) objects when collecting, since objects have b...
Antony L. Hosking, J. Eliot B. Moss, Darko Stefano...