Dissertationen zum Thema „Design of protocols“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Design of protocols" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Bandyopadhyay, Amrit. „The smart stone protocol (SSP) design and protocols /“. College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Der volle Inhalt der QuelleThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. „DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS“. OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Der volle Inhalt der QuelleMüffke, Friedger. „A better way to design communication protocols“. Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Der volle Inhalt der QuelleHoran, Stephen, und Giriprassad Deivasigamani. „USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL“. International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Der volle Inhalt der QuelleThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. „A model for secure protocols and its application to systematic design of cryptographic protocols“. Thesis, Queensland University of Technology, 2001.
Den vollen Inhalt der Quelle findenRouget, Peter. „Design of mechanisms for filtering and isolations of industrial protocols“. Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Der volle Inhalt der QuelleWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. „Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach“. Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Der volle Inhalt der QuelleLiu, Changlei, und 劉長雷. „Bluetooth network design“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Der volle Inhalt der QuelleShen, Xiaowei 1966. „Design and verification of adaptive cache coherence protocols“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Der volle Inhalt der QuelleSubramanian, Srividhya. „Design and verification of secure E-commerce protocols /“. The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Der volle Inhalt der QuelleByun, Youngjoon. „Pattern-based design and validation of communication protocols“. [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0001253.
Der volle Inhalt der QuelleGorantla, Malakondayya Choudary. „Design and analysis of group key exchange protocols“. Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37664/1/Malakondayya_Gorantla_Thesis.pdf.
Der volle Inhalt der QuelleYu, Shui, und mikewood@deakin edu au. „Anycast services and its applications“. Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.
Der volle Inhalt der QuelleSavage, Stefan R. „Protocol design in an uncooperative Internet /“. Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Der volle Inhalt der QuelleModesti, Paolo <1966>. „Verified security protocol modeling and implementation with AnBx“. Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Der volle Inhalt der QuelleAnBx è un'estensione della notazione Alice & Bob per la descrizione di protocolli, ed è utilizzato come linguaggio di specifica per la modellazione puramente dichiarativa dei protocolli distribuiti. AnBx è costituito da un insieme di astrazioni sui dati e sui modi di comunicazione che forniscono il supporto di base per le proprietà di sicurezza ad alto livello, schermando i dettagli della infrastruttura crittografica sottostante. AnBx, essendo implementato sul tool di verifica OFMC, è utilizzabile non solo per specifica e la progettazione ma anche per l'analisi della sicurezza dei protocolli distribuiti. Inoltre il framework consente la generazione automatica del codice Java di protocolli descritti in AnBx, mantenendo separate la logica del protocollo dalla logica dell'applicazione. L'efficacia del nostro approccio è mostrata nella specifica ed nell'analisi di due protocolli di pagamento elettronico usati nel mondo reale, realizzando proprietà di sicurezza più forti e più scalabili rispetto a quelle delle versioni originali. Nella seconda parte della tesi analizziamo in maniera formale il sistema di comunicazione veicolare sicura (SeVeCom) utilizzando il framework AIF, che è basato su una nuova tecnica di set-abstraction. Nel corso del lavoro abbiamo trovato due nuovi attacchi, e verificato che sotto ragionevoli ipotesi il sistema è sicuro.
Zang, Joanna Q. „Design of a redundancy protocol /“. free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Der volle Inhalt der QuellePark, Pangun. „Modeling, Analysis and Design of Wireless Sensor Network Protocols“. Doctoral thesis, KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-29821.
Der volle Inhalt der QuelleQC 20110217
Kubbar, Osama. „Design and performance evaluation of broadband wireless MAC protocols“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0011/NQ52827.pdf.
Der volle Inhalt der QuelleYadav, Naveen. „Design of efficient communication protocols for clustered sensor networks /“. Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1203588051&sid=9&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Der volle Inhalt der QuelleAl-Mefleh, Haithem Abdel-Razaq Ahmad. „Design and analysis of MAC protocols for wireless networks“. [Ames, Iowa : Iowa State University], 2009.
Den vollen Inhalt der Quelle findenMaimuţ, Diana Ştefania. „Authentication and encryption protocols : design, attacks and algorithmic improvements“. Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0047/document.
Der volle Inhalt der QuelleThis thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements and attacks. In addition, we venture out of cryptography and propose two new applications of cryptographic techniques to error correcting codes. Our main results comprise a provably secure co-signature protocol and a provably secure authenticated encryption scheme. Our co-signature protocol achieves legal fairness, a novel fairness variant that does not rely on third parties. Legal fairness is implemented using Schnorr signatures. We also present a distributed Fiat-Shamir authentication protocol. The second part of the thesis is devoted to computational improvements, we discuss a method for doubling the speed of Barrett’s algorithm by using specific composite moduli, devise new BCH speed-up strategies using polynomial extensions of Barrett’s algorithm, describe a new backtracking-based multiplication algorithm suited for lightweight microprocessors and present a new number theoretic error-correcting code. Fault injection attacks are further overviewed and a new fault attack on ECC implementations is proposed
Bian, Song. „Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques“. Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Der volle Inhalt der QuelleKatila, Charles Jumaa <1985>. „Medium Access Control and Routing Protocols Design for 5G“. Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8638/1/Katila_PhD_Thesis.pdf.
Der volle Inhalt der QuelleChae, Youngsu. „Algorithms, protocols and services for scalable multimedia streaming“. Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/8148.
Der volle Inhalt der QuelleSala, Dolors. „Design and evaluation of MAC protocols for hybrid fiber/coaxial systems“. Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/13268.
Der volle Inhalt der QuelleTéllez, Isaac Jesús Augusto. „Design of secure mobile payment protocols for restricted connectivity scenarios“. Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/96918.
Der volle Inhalt der QuelleSaleh, Kassem Afif. „Synthesis methods for the design and validation of communication protocols“. Thesis, University of Ottawa (Canada), 1991. http://hdl.handle.net/10393/7786.
Der volle Inhalt der QuelleDi, Marco Piergiuseppe. „Modeling and Design of Wireless Protocols for Networked Control Applications“. Doctoral thesis, KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-107411.
Der volle Inhalt der QuelleQC 20121212
Jerjees, Zina. „Design of interface selection protocols for multi-homed wireless networks“. Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/7372.
Der volle Inhalt der QuellePanzieri, Fabio. „Design and development of communication protocols for local area networks“. Thesis, University of Newcastle Upon Tyne, 1985. http://hdl.handle.net/10443/2114.
Der volle Inhalt der QuelleRiliskis, Laurynas. „On design of dependable communication protocols for wireless sensor networks“. Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-18357.
Der volle Inhalt der QuelleGodkänd; 2011; 20110322 (lauril); LICENTIATSEMINARIUM Ämnesområde: Datorkommunikation/Computer Networking Examinator: Associate Professor Evgeny Osipov, Institutionen för system- och rymdteknik, Luleå tekniska universitet Diskutant: Professor Marko Hännikäinen, Tampere University of Technology, Department of Computer Systems, Finland Tid: Tisdag den 19 april 2011 kl 10.15 Plats: A109, Luleå tekniska universitet
Toor, Yasser. „Design and optimization of broadcast and MAC protocols for VANETs“. Paris 6, 2009. http://www.theses.fr/2009PA066697.
Der volle Inhalt der QuelleHill, Martin R. „The design of robust protocols for distributed real-time systems“. Thesis, Aston University, 1990. http://publications.aston.ac.uk/8077/.
Der volle Inhalt der QuelleWeng, Chunhua. „Supporting collaborative clinical trial protocol writing through an annotation design /“. Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7155.
Der volle Inhalt der QuelleMarcadet, Gaël. „Design of Secure Multi-User Protocols : Application to Bandits, Ticketing and File Transfer“. Electronic Thesis or Diss., Université Clermont Auvergne (2021-...), 2024. http://www.theses.fr/2024UCFA0055.
Der volle Inhalt der QuelleA cryptographic protocol establishes a series of interactions among users to deliver a given functionality while ensuring various properties, a protocol being considered secure when it successfully ensures all intended properties. Accomplishing these properties requires the need of cryptographic primitives, whose usage may entail computation overhead, limiting the scalability of the protocol. Throughout this manuscript, we focus on three problems dealing with multiple users. The first contribution focuses on the design of a federated multi-armed bandits framework where a federation server, acting as a learning agent, sequentially pulls a bandit arm, the environment responding with a reward coming from an unknown distribution associated with the chosen bandit. In this contribution, we introduce Tango, a secure federated multi-armed bandits protocol fixing and extending our initial attempt Samba shown to be insecure. Tango is proved to prevent the federation server to learn the reward distribution, the obtained rewards and the pulled bandit arm, at the cost of a large computation overhead due to the usage of expensive cryptographic primitives. In the second part of this contribution, we introduce Salsa a secure federated multi-armed bandits protocol moving away from the blueprint of Samba and Tango, still preventing the federation server to learn sensitive data while achieving high-performance. The second contribution of this manuscript addresses a problem involving a large number of users, since it concerns the design of a ticketing system. Indeed, despite the high-demand, these systems provide very restricted guarantees. For instance, one may easily resell a ticket twice. To go further, tickets are nominative, revealing the identity of the ticket's owner. Using standard cryptographic primitives, we propose two scalable ticketing systems called Applause and Spotlight, ensuring anonymity of users while featuring ticket purchasing, ticket refunding, ticket validation and ticket transferability. The difference between Applause and Spotlight lies in the ability to recover the identity of an attendee: In Applause, the anonymity of every user is guaranteed at any time, a property that still hold with Spotlight except for an additional third-party able to recover the identity of an attendee, at the cost of a slightly longer ticket validation. Our third and final contribution deals with the problem of file transfer by broadcasting, which involves sharing a file with a group of users. The trivial solution of storing files on a single, publicly accessible server falls short for instance when the server is down or when the server handles a high number of requests. In this contribution, we introduce a universally composable and efficient protocol allowing one to share a file with a specified group of users while ensuring confidentiality, integrity of the file and sender authentication
Krishnamurthy, Rajaram B. „Scalable real-time architectures and hardware support for high-speed QoS packet schedulers“. Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/8196.
Der volle Inhalt der QuelleAbrougui, Kaouther. „Design and Performance Evaluation of Service Discovery Protocols for Vehicular Networks“. Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20246.
Der volle Inhalt der QuelleSivabalan, Muthurajah. „Design and performance evaluation of routing protocols for connection-oriented networks“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/NQ35978.pdf.
Der volle Inhalt der QuelleUlfsnes, Rasmus. „Design of a Snoop Filter for Snoop Based Cache Coherency Protocols“. Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22383.
Der volle Inhalt der QuelleLacks, Daniel Jonathan. „MODELING, DESIGN AND EVALUATION OF NETWORKING SYSTEMS AND PROTOCOLS THROUGH SIMULATION“. Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3792.
Der volle Inhalt der QuellePh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Engineering PhD
Al-Janabi, Thair. „Design of energy efficient protocols-based optimisation algorithms for IoT networks“. Thesis, Brunel University, 2018. http://bura.brunel.ac.uk/handle/2438/17121.
Der volle Inhalt der QuelleBaptiste, Cavarec. „Design and Study of Passive Localisation Protocols Using Commercial UWB Radios“. Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199920.
Der volle Inhalt der QuelleBehovet av noggranna positioneringssystem har uppkommit moderna samhället efterssom system såsom GPS och basstationsstödd lokalisering av mobilerin klarar att ge tillräckligt god noggrannhet för inomhuspositionering. Ultrabredbandig radio (UWB) är en god kandidat för inomhuspositioneringssystemeftersom det potentiellt ger en noggrannhet ned på centimeternivå. Schemabaserad positionering är en nyligen introducerad metod som baseraspå meddelanden som sänds mellan asynkrona referensnoder enligt ett givetschema, med specifika fördröjningar. Det har visats att en nod kan lokalisera sig själv genom att lyssna på meddelandena från referensnoderna, undervissa antaganden om sändschemat. Metoden har varit utformad för att fungerapå billiga UWB-enheter, men har fram tills nu inte implementerats på riktighårdvara. Huvudsyftet med detta projekt har varit att implementera ett sådan sys-tem mha kommersiellt tillgängliga UWB-enheter (Decawave DW100) och attutforma protokoll som kan kompensera för hårdvarufel och -begränsningar. Denna avhandling föreslår en utförlig mätmodel för schemabaserad positionering med riktiga enheter och presenterar de utmaningar som behövde hanterasi implementeringen på EVK1000-enheter. Dessutom presenteras en utökning avschemabaserad positionering för scenarior där kommunikationen mellan vissanoder är blockerad. Slutligen ger vi en experimentell resultatanalys och jäm-förelse med simuleringar och hybrida Cramér Rao-gränser.
Curran, Phillip. „A formal approach to the analysis and design of communications protocols“. Thesis, Queen Mary, University of London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393161.
Der volle Inhalt der QuelleMitchel, Robert Raymondl III. „Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems“. Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19338.
Der volle Inhalt der QuelleThe design part includes host IDS, system IDS and IDS response designs. The validation part includes a novel model-based analysis methodology with simulation validation. Our objective is to maximize the CPS reliability or lifetime in the presence of malicious nodes performing attacks which can cause security failures. Our host IDS design results in a lightweight, accurate, autonomous and adaptive protocol that runs on every node in the CPS to detect misbehavior of neighbor nodes based on state-based behavior specifications. Our system IDS design results in a robust and resilient protocol that can cope with malicious, erroneous, partly trusted, uncertain and incomplete information in a CPS. Our IDS response design results in a highly adaptive and dynamic control protocol that can adjust detection strength in response to environment changes in attacker strength and behavior. The end result is an energy-aware and adaptive IDS that can maximize the CPS lifetime in the presence of malicious attacks, as well as malicious, erroneous, partly trusted, uncertain and incomplete information.
We develop a probability model based on stochastic Petri nets to describe the behavior of a CPS incorporating our proposed intrusion detection and response designs, subject to attacks by malicious nodes exhibiting a range of attacker behaviors, including reckless, random, insidious and opportunistic attacker models. We identify optimal intrusion detection settings under which the CPS reliability or lifetime is maximized for each attacker model. Adaptive control for maximizing IDS performance is achieved by dynamically adjusting detection and response strength in response to attacker strength and behavior detected at runtime. We conduct extensive analysis of our designs with four case studies, namely, a mobile group CPS, a medical CPS, a smart grid CPS and an unmanned aircraft CPS. The results show that our adaptive intrusion and response designs operating at optimizing conditions significantly outperform existing anomaly-based IDS techniques for CPSs.
Ph. D.
Gaddam, Shravya. „Design and Implementation of PUF Based Protocols for Remote Integrity Verification“. Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71865.
Der volle Inhalt der QuelleMaster of Science
Berrian, Joshua. „AN AUTOMATED TEST STATION DESIGN USED TO VERIFY AIRCRAFT COMMUNICATION PROTOCOLS“. DigitalCommons@CalPoly, 2011. https://digitalcommons.calpoly.edu/theses/635.
Der volle Inhalt der QuelleTRAVERSO, STEFANO. „Design of Algorithms and Protocols for Peer-To-Peer Streaming Systems“. Doctoral thesis, Politecnico di Torino, 2012. http://hdl.handle.net/11583/2497192.
Der volle Inhalt der QuelleWilkenloh, Christopher Joselane. „Design of a reliable message transaction protocol“. Thesis, Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/8307.
Der volle Inhalt der QuelleWang, Yunsheng. „Designing Efficient Routing Protocols in Delay Tolerant Networks“. Diss., Temple University Libraries, 2013. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/224066.
Der volle Inhalt der QuellePh.D.
This thesis presents the design and evaluation of routing protocols for efficient content delivery and dissemination in delay tolerant networks. With the advancement in technology, the communication devices with wireless interfaces become more and more universal. Delay tolerant networks (DTNs) are characterized by intermittent connectivity and limited network capacity. There exist several different application scenarios: connectivity of developing countries, vehicular DTN road communications, and social contact networks. In this thesis, we explore the characteristics in DTNs, such as mobility pattern, contact history information, and social feature information, to design efficient routing schemes. The research reported in this thesis investigates the technical challenges and their solutions of applying different DTN routing protocols. We design multicast schemes to forward the information to a group of destinations in DTN environment. We extend the delegation forwarding scheme in DTN multicasting. An non-replication multicast tree is also studied in this report. We also apply ticket-based and social-tie-based approaches in content distribution systems. We leverage the users' social feature information to study the hypercube-based routing schemes in social contact networks. We also study the resource management problem in DTNs. We design a joint replication-migration-based scheme to solve the storage congestion. These techniques are evaluated comprehensively in realistic simulation studies, by comparing the performance with state-of-the-art approaches in both synthetic and real traces.
Temple University--Theses
吳家寧. „On performance evaluation and protocols design of tree protocol with collision detection“. Thesis, 1990. http://ndltd.ncl.edu.tw/handle/73044436994718714046.
Der volle Inhalt der Quelle