Sciweavers

28 search results - page 2 / 6
» comcom 2000
Sort
View
COMCOM
2000
143views more  COMCOM 2000»
13 years 8 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou
COMCOM
2000
96views more  COMCOM 2000»
13 years 8 months ago
Bifurcated-M routing for multi-point videoconferencing
Dynamic routing, if properly designed, can increase the throughput of a network. In this paper, we formulate a traffic model for multi-point videoconferencing in a VP-based ATM ne...
Gang Feng, Tak-Shing Peter Yum
COMCOM
2000
57views more  COMCOM 2000»
13 years 8 months ago
A distance-vector routing protocol for networks with unidirectional links
We proposea simple distance-vectorprotocolfor routingin networkshavingunidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in...
Francis Chi-Moon Lau, Guihai Chen, Hao Huang, Li X...
COMCOM
2000
95views more  COMCOM 2000»
13 years 8 months ago
Protocols and architecture for managing TCP/IP network infrastructures
With their increased power and versatility, today's computer networks are becoming used for an ever-growing number of diverse applications. Further, the networking structures...
A. King, R. Hunt
COMCOM
2000
97views more  COMCOM 2000»
13 years 8 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau