Sciweavers

2699 search results - page 78 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
INFOCOM
2012
IEEE
11 years 11 months ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
DSN
2005
IEEE
14 years 2 months ago
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluati...
A. Sousa, José Pereira, L. Soares, Alfr&aci...
SAINT
2006
IEEE
14 years 2 months ago
Anti-collision performance of Gen2 Air Protocol in Random Error Communication Link
When a multitude of RFID tags are in the interrogating field, an anti-collision technology must be used. In literatures, the reading performance was mainly investigated on the er...
Yuusuke Kawakita, Jin Mitsugi
LCN
2007
IEEE
14 years 3 months ago
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Abstract—Telephony gateways are devices that interface between IP telephony networks and the PSTN. A telephony proxy or location server (LS) that attempts to connect a call for a...
Kushal Kumaran, Anirudha Sahoo
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
14 years 2 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson