Protocol analysis

Results: 1021



#Item
961Network architecture / Network protocols / Network performance / Internet Relay Chat / SOCKS / Session / Transmission Control Protocol / Proxy server / Denial-of-service attack / Computing / Internet / Internet privacy

Inferno Nettverk A/S Technical Report Analysis of the session limit functionality in Dante version[removed]August 6, 2012

Add to Reading List

Source URL: www.inet.no

Language: English - Date: 2012-08-06 06:59:49
962Computing / Internet protocols / Internet standards / Routing / Open Shortest Path First / Router / Border Gateway Protocol / IS-IS / Traceroute / Routing protocols / Network architecture / Internet

Detection and Analysis of Routing Loops in Packet Traces Urs Hengartner, Sue Moon, Richard Mortier, Christophe Diot Abstract— Routing loops are caused by inconsistencies in routing state among a set of routers. They oc

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2002-10-28 12:02:35
963Software testing / OSI protocols / Computer networking / Network architecture / OSI model / Communications protocol / LAPB / Conformance testing / Data / Computing / Information

A NEW METHODOLOGY FOR OSI CONFORMANCE TESTING BASED ON TRACE ANALYSIS By RUSSIL WVONG B. Sc., The University of British Columbia, 1988 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF

Add to Reading List

Source URL: www.russilwvong.com

Language: English - Date: 2014-04-27 13:09:37
964Carbon finance / Environmental economics / Emissions trading / United Nations Framework Convention on Climate Change / European Union Emission Trading Scheme / Carbon tax / Policy analysis / Kyoto Protocol / Economics of global warming / Climate change policy / Environment / Climate change

Competitiveness Effects of Trading Emissions and Fostering Technologies to Meet the EU Kyoto Targets: A Quantitative Economic Assessment Industrial Policy and Economic Reforms Papers No.4 Editor:

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-10-18 12:27:32
965Internet / Onion routing / Tor / .onion / Routing / Pseudonymity / Anonymity / Communications protocol / Universal composability / Cryptography / Internet privacy / Computing

Anonymity Analysis of Onion Routing in the Universally Composable Framework Joan Feigenbaum Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-07-09 22:10:10
966Scheduling / Ping / Transmission Control Protocol / Software / Round-trip delay time / Network performance / System software / Computing / Latency

Inferno Nettverk A/S Technical Report Analysis of Real-Time scheduling functionality in Dante version[removed]March 7, 2012

Add to Reading List

Source URL: www.inet.no

Language: English - Date: 2012-03-07 14:14:03
967IPv6 / Working groups / Internet standards / RIPE NCC / RIPE / IPv4 / Border Gateway Protocol / IPv6 deployment / IPv4 address exhaustion / Network architecture / Internet Protocol / Internet

RIPE Network Coordination Centre RIPE Labs Operators Tools, Ideas and Analysis Mirjam Kühne, RIPE NCC

Add to Reading List

Source URL: www.potaroo.net

Language: English - Date: 2010-07-22 16:44:47
968Technology / Public-key cryptography / Near field communication / Coupon / Communications protocol / Cryptography / Cryptographic protocols / Data

Formal Security Analysis and Improvement of a hash-based NFC M-coupon Protocol Ali Alshehri, Steve Schneider Dept. of Computing, University of Surrey Guildford GU2 7XH, England

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2013-12-06 10:43:15
969RSA / ProVerif / Cryptographic protocols / Cryptography / Electronic commerce / Public-key cryptography

Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage Bruno Blanchet ´ CNRS, Ecole Normale Sup´erieure, INRIA∗

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-10-01 13:05:01
970Information / Communicating sequential processes / Communications protocol / Cryptographic primitive / Public-key cryptography / Model checking / Yahalom / Burrows–Abadi–Needham logic / Protocol / Cryptographic protocols / Cryptography / Data

The Modelling and Analysis of Security Protocols: the CSP Approach P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe and A.W. Roscoe

Add to Reading List

Source URL: www.computing.surrey.ac.uk

Language: English - Date: 2010-12-15 14:57:33
UPDATE