咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 6 篇 protocol impleme...
  • 2 篇 protocol specifi...
  • 1 篇 pairing-free
  • 1 篇 timers
  • 1 篇 timer facilities
  • 1 篇 internet protoco...
  • 1 篇 hierarchical whe...
  • 1 篇 semi-automatic i...
  • 1 篇 hashed wheels
  • 1 篇 branch mispredic...
  • 1 篇 finite state mac...
  • 1 篇 elliptic-curve c...
  • 1 篇 revocable
  • 1 篇 servers
  • 1 篇 switches
  • 1 篇 general forking ...
  • 1 篇 program processo...
  • 1 篇 internet
  • 1 篇 automated develo...
  • 1 篇 internet protoco...

机构

  • 1 篇 technol innovat ...
  • 1 篇 ntt corp
  • 1 篇 natl univ def te...
  • 1 篇 phoenix technol ...
  • 1 篇 kanagawa univ yo...
  • 1 篇 univ maryland ba...
  • 1 篇 dartmouth coll d...
  • 1 篇 univ maryland in...
  • 1 篇 digital equipmen...
  • 1 篇 eurecom f-06904 ...
  • 1 篇 errata secur atl...
  • 1 篇 natl def univ co...

作者

  • 1 篇 tomida junichi
  • 1 篇 yasuda kan
  • 1 篇 xagawa keita
  • 1 篇 feng chao
  • 1 篇 lauck a
  • 1 篇 nagai akira
  • 1 篇 graham robert da...
  • 1 篇 nakagawa kohei
  • 1 篇 meng qingkun
  • 1 篇 fujioka atsushi
  • 1 篇 biersack ew
  • 1 篇 varghese g
  • 1 篇 rutsche e
  • 1 篇 zhang bin
  • 1 篇 blumer tp
  • 1 篇 sidhu dp
  • 1 篇 johnson peter c.
  • 1 篇 wu ligeng
  • 1 篇 wen shameng
  • 1 篇 tang chaojing

语言

  • 5 篇 英文
  • 1 篇 其他
检索条件"主题词=protocol implementations"
6 条 记 录,以下是1-10 订阅
排序:
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable  8th
Making the Identity-Based Diffie-Hellman Key Exchange Effici...
收藏 引用
8th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT)
作者: Nakagawa, Kohei Fujioka, Atsushi Nagai, Akira Tomida, Junichi Xagawa, Keita Yasuda, Kan NTT Corp Tokyo Japan Kanagawa Univ Yokohama Kanagawa Japan Technol Innovat Inst Abu Dhabi U Arab Emirates
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is equipped with scalable key revocation. Our protocol builds upon the most efficient identity-based Diffie-Hellman key exchange... 详细信息
来源: 评论
Testing Network protocol Binary Software with Selective Symbolic Execution  12
Testing Network Protocol Binary Software with Selective Symb...
收藏 引用
12th International Conference on Computational Intelligence and Security (CIS)
作者: Wen, Shameng Feng, Chao Meng, Qingkun Zhang, Bin Wu, Ligeng Tang, Chaojing Natl Univ Def Technol Coll Elect Sci & Engn Changsha Hunan Peoples R China Natl Def Univ Coll Mechatron Engn & Automat Changsha Hunan Peoples R China
The vulnerabilities existing in network protocol implementations are difficult to detect. The main reason is that the state space of complex protocol binary software is too large to explore. This paper proposes a nove... 详细信息
来源: 评论
Finite State Machine Parsing for Internet protocols: Faster Than You Think
Finite State Machine Parsing for Internet Protocols: Faster ...
收藏 引用
35th IEEE-Computer-Society Workshop on Security and Privacy (SP)
作者: Graham, Robert David Johnson, Peter C. Errata Secur Atlanta GA 30309 USA Dartmouth Coll Dept Comp Sci Hanover NH USA
A parser's job is to take unstructured, opaque data and convert it to a structured, semantically meaningful format. As such, parsers often operate at the border between untrusted data sources (e.g., the Internet) ... 详细信息
来源: 评论
Hashed and hierarchical timing wheels: Efficient data structures for implementing a timer facility
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 1997年 第6期5卷 824-834页
作者: Varghese, G Lauck, A Digital Equipment Corp Littleton MA USA
The performance of timer algorithms is crucial to many network protocol implementations that use timers for failure recovery and rate control, Conventional algorithms to implement an Operating System timer module take... 详细信息
来源: 评论
Demultiplexing on the ATM adapter: Experiments with Internet protocols in user space
收藏 引用
JOURNAL OF HIGH SPEED NETWORKS 1996年 第2期5卷 193-201页
作者: Biersack, EW Rutsche, E EURECOM F-06904 SOPHIA ANTIPOLISFRANCE
We took a public domain implementation of the TCP/IP protocol stack and ported into user space. The user space implementation was then optimized by a one-to-one mapping of transport connections onto ATM connections an... 详细信息
来源: 评论
SEMIAUTOMATIC IMPLEMENTATION OF OSI protocolS
COMPUTER NETWORKS AND ISDN SYSTEMS
收藏 引用
COMPUTER NETWORKS AND ISDN SYSTEMS 1990年 第3期18卷 221-238页
作者: SIDHU, DP BLUMER, TP UNIV MARYLAND BALTIMORE CTY DEPT COMP SCI BALTIMORE MD 21228 USA UNIV MARYLAND INST ADV COMP STUDIES COLLEGE PK MD 20742 USA PHOENIX TECHNOL LTD CAMBRIDGE MA 02139 USA
This paper discusses semi-automatic implementation of communication protocols in the Reference Model of the International Organization for Standardization (ISO) for Open Systems Interconnection (OSI). The semi-automat... 详细信息
来源: 评论