搜索结果: 1-13 共查到“计算机科学技术 protocol”相关记录13条 . 查询时间(0.062 秒)
MP-DSM: a distributed cross layer network control protocol
network management TCP optimization control QoS cross layer utility functions
2015/8/11
We present a distributed cross layer approach to controlling the network performance under various QoS requirements in interference limited systems. The interaction between the different layers of the...
The use of model checking for validation requires that models of the underlying system be created. Creating such models is both difficult and error prone and as a result, verification is rarely used d...
Model Checking Large Network Protocol Implementations
Model Checking Large Network Protocol Implementations
2015/8/7
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks. However, network pro...
A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications
Agent-Based Signature Delegation Anonymous Digital Signature Signature Fairness Collusion-Resistant Signature
2013/1/28
Mobile agent technology is promising for e-commerce and distributed computing applications due to its properties of mobility and autonomy. One of the most security-sensitive tasks a mobile agent is ex...
Protocol and System Design for a Service-centric Network Architecture
Computer networking Internet Architecture Next Generation Internet Resource Allocation Routing Service centric
2014/11/7
Next-generation Internet will be governed by the need for flexibility. Heterogeneous end-systems, novel applications, and security and manageability challenges require networks to provide a broad rang...
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
Network Security Military Ad-hoc network Cryptography Signcryption Multi-tiered Structures
2010/10/12
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information ...
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is pr...
Network Traffic Properties of Bimodal Multicast Protocol
Multicast network traffic self-similarity long-range dependence
2009/7/28
The popularity of large-scale distributed applications, such as videoconferencing, multimedia dissemination, electronic stock exchange and distributed cooperative work, has grown with the availability...
A New Congestion Control Mechanism Proposed for the SSCOP Protocol
Protocol Design ADSL SSCOP
2009/7/28
International Telecommunication Union, Telecommunications Sector (ITU-T) Recommendation Q.2110 states that the update of a granted credit window to the transmitter (VR(MR)) is implementation dependent...
AbstractTo support QoS routing in MANET (mobile ad hoc networks) is a core issue in the research of MANET. Numerous studies have shown the difficulty for provision of quality-of-service (QoS) guarante...
AbstractThe primary goal of the Transport Layer Security (TLS) protocol is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive st...
An Energy-Efficient Protocol with Static Clustering for Wireless Sensor Networks
Clustering methods energy efficiency routing protocol
2010/2/2
A wireless sensor network with a large number of tiny
sensor nodes can be used as an effective tool for gathering data in
various situations. One of the major issues in wireless sensor
networks is ...
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Analysing the Woo-Lam Protocol CSP Rank Functions
2014/3/12
Designing security protocols is a challenging and deceptive exercise. Even small protocols providing straightforward security goals, such as authentication, have been hard to design correctly, leading...