Results 1 - 10
of
28,092
TABLE VI NETWORK DESIGN CONSIDERATIONS FOR 7 TYPES OF APPLICATIONS Application Channel Packet Routing Protocol Connection Transportation Security
2006
Cited by 3
Table 1: Comparison of protocols
2007
"... In PAGE 4: ... However, this work lacks anonymity and security since it does not provide any measure that secures the various voting stages. A comparison of these protocols and their characteristics is shown in Table1 . To be fair, however, we need to mention that these protocols were not designed with the properties of Section 2 in mind.... ..."
Cited by 2
Table 1. Security Classes
"... In PAGE 2: ... Other designs may consider di#0Berent classes. Table1 provides a summary of the security classes. Most of security aspects such as con#0Cdentiality,integrity and authenticityhave been considered in Class 3.... In PAGE 2: ... Sec- ond, even if the remote side is only capable of accept- ing agreed-on parameters, the sending user must decide whether these parameters can be used for the requested session. For example, in our implementation, the security service speci#0Ccations of Class 3 #28 Table1 #29 recommend the 160-bit SHA, 128-bit MD5 with authentication protocol, re-authentication protocol and inline securitylayer #28bulk encryption with RC4#29.... ..."
Table 1. Attack and security levels
2005
Cited by 2
Tables (DHT) [12]. To the best of our knowledge, only [4] has attempted to present a secure protocol at message level in addition to a trust model. Their protocol is based on a polling based mech- anism and use public key cryptographyto provide various se- curity features. In contrast, the TrustMe design argues that, to provide secure, reliable, and accountable distribution and access of trust ratings of peers, it is not only important to authenticate the P2P messages but also critical to ensure re- questor anonymity and provider anonymity for distributed management of trust relationships in dcentralized P2P sys- tems.
2003
Cited by 43
TABLE V ACHIEVEDTHROUGHPUTOF SECURITY PROTOCOLS
1999
Cited by 32
Table 1: Primitives in Obol.
"... In PAGE 4: ...ection 4.2). Taken together, the core of Obol consists of a small set of primitive operations aimed at the core func- tionality of security protocols. The operations are summarized in Table1 . The operators are designed to facilitate the implementation of security proto- cols, and are designed to ease the translation from a protocol description that will also be used as a starting point for an idealization.... ..."
Results 1 - 10
of
28,092