Sciweavers

2699 search results - page 72 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
CONEXT
2005
ACM
13 years 11 months ago
Increasing the determinism of network emulation to evaluate communication protocols
In this paper, we propose an emulation solution whose purpose is to deal with the need of reproducibility that is encountered in communication protocols evaluation and transport p...
Emmanuel Conchon, Johan Garcia
HPCC
2010
Springer
13 years 6 months ago
Implementation and Evaluation of a NAT-Gateway for the General Internet Signaling Transport Protocol
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in ...
Roland Bless, Martin Röhricht
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
14 years 4 days ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek
IJIPT
2008
81views more  IJIPT 2008»
13 years 9 months ago
Towards seamless source mobility in SSM: design and evaluation of the Tree Morphing protocol
: Multimedia networking in the near future is expected to be dominated by group applications such as IPTV, MMORPGs, and video conferencing. Hand in hand with new service offers, th...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
NETWORKING
2004
13 years 10 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt