Sciweavers

2699 search results - page 80 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik
OTM
2009
Springer
14 years 3 months ago
Evaluating Throughput Stability of Protocols for Distributed Middleware
Communication of large data volumes is a core functionality of distributed systems middleware, namely, for interconnecting components, for distributed computation and for fault tol...
Nuno Carvalho, José P. Oliveira, José...
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ENTCS
2006
173views more  ENTCS 2006»
13 years 9 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ENTCS
2007
98views more  ENTCS 2007»
13 years 9 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...