Dissertations / Theses on the topic 'Design of protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Design of protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Full textMüffke, Friedger. "A better way to design communication protocols." Thesis, University of Bristol, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411109.
Full textHoran, Stephen, and Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Full textThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols." Thesis, Queensland University of Technology, 2001.
Find full textRouget, Peter. "Design of mechanisms for filtering and isolations of industrial protocols." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS027/document.
Full textWith the rise of Industry 4.0, many infrastructures were forced to open their networks to the Internet, mainly to meet the growing need for supervision and remote control. But where these infrastructures were previously isolated, spared from external threats, their opening has caused the emergence of new threats, particularly network ones, which were not addressed and present serious risks.Network cybersecurity solutions, like Firewalls, Intrusion Detection Systems or Intrusion Protection Systems are commonly used to address the concern of industrial infrastructures cybersecurity. However the trend of relying on software-based systems to ensure network protection brought to light the vulnerabilities of these systems, due to their inherent software implementation. Furthermore, the industry is tied to its own specificities (low-latency, support of specific network protocols), which are rarely covered by common IT solutions.The main goal of this thesis is to study the use of FPGA-based devices applied to cybersecurity for industrial networks. Either as support for software-based security applications, or to perform critical network analysis operations. First it presents the industrial context, with control systems, their architectures, needs, implementation rules, specific protocols and also gives two examples of control systems as they can be found in the industry. Then it highlights the security problematic, with a description of the most common threats, cases study about their applications and impact in a control system, and discussions on the state of the art counter-measures available on the market. Through the establishment of a security target, it points the vulnerability of software elements and operating systems as well as the lack of process state aware security analysis.To address these issues, we propose, through a first contribution, to enforce the security of the software system by taking advantage of existing FPGA's protection mechanisms. Finally, to answer specific application threats, we introduce an implementation of a brute force matching architecture with time and operational-process awareness, on FPGA.This thesis was conducted in collaboration between the Montpellier computer science, robotic and microelectronic laboratory (LIRMM) and the SECLAB company
Zamora, Garcia Gerardo Alejandro. "Hardware Design for Cryptographic Protocols: An Algorithmic State Machine Design Approach." Thesis, North Dakota State University, 2016. https://hdl.handle.net/10365/28221.
Full textLiu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.
Full textShen, Xiaowei 1966. "Design and verification of adaptive cache coherence protocols." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86480.
Full textSubramanian, Srividhya. "Design and verification of secure E-commerce protocols /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488192119264905.
Full textByun, Youngjoon. "Pattern-based design and validation of communication protocols." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0001253.
Full textGorantla, Malakondayya Choudary. "Design and analysis of group key exchange protocols." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37664/1/Malakondayya_Gorantla_Thesis.pdf.
Full textYu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.
Full textSavage, Stefan R. "Protocol design in an uncooperative Internet /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6995.
Full textModesti, Paolo <1966>. "Verified security protocol modeling and implementation with AnBx." Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1234.
Full textAnBx è un'estensione della notazione Alice & Bob per la descrizione di protocolli, ed è utilizzato come linguaggio di specifica per la modellazione puramente dichiarativa dei protocolli distribuiti. AnBx è costituito da un insieme di astrazioni sui dati e sui modi di comunicazione che forniscono il supporto di base per le proprietà di sicurezza ad alto livello, schermando i dettagli della infrastruttura crittografica sottostante. AnBx, essendo implementato sul tool di verifica OFMC, è utilizzabile non solo per specifica e la progettazione ma anche per l'analisi della sicurezza dei protocolli distribuiti. Inoltre il framework consente la generazione automatica del codice Java di protocolli descritti in AnBx, mantenendo separate la logica del protocollo dalla logica dell'applicazione. L'efficacia del nostro approccio è mostrata nella specifica ed nell'analisi di due protocolli di pagamento elettronico usati nel mondo reale, realizzando proprietà di sicurezza più forti e più scalabili rispetto a quelle delle versioni originali. Nella seconda parte della tesi analizziamo in maniera formale il sistema di comunicazione veicolare sicura (SeVeCom) utilizzando il framework AIF, che è basato su una nuova tecnica di set-abstraction. Nel corso del lavoro abbiamo trovato due nuovi attacchi, e verificato che sotto ragionevoli ipotesi il sistema è sicuro.
Zang, Joanna Q. "Design of a redundancy protocol /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418080.
Full textPark, Pangun. "Modeling, Analysis and Design of Wireless Sensor Network Protocols." Doctoral thesis, KTH, Reglerteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-29821.
Full textQC 20110217
Kubbar, Osama. "Design and performance evaluation of broadband wireless MAC protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0011/NQ52827.pdf.
Full textYadav, Naveen. "Design of efficient communication protocols for clustered sensor networks /." Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1203588051&sid=9&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textAl-Mefleh, Haithem Abdel-Razaq Ahmad. "Design and analysis of MAC protocols for wireless networks." [Ames, Iowa : Iowa State University], 2009.
Find full textMaimuţ, Diana Ştefania. "Authentication and encryption protocols : design, attacks and algorithmic improvements." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0047/document.
Full textThis thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements and attacks. In addition, we venture out of cryptography and propose two new applications of cryptographic techniques to error correcting codes. Our main results comprise a provably secure co-signature protocol and a provably secure authenticated encryption scheme. Our co-signature protocol achieves legal fairness, a novel fairness variant that does not rely on third parties. Legal fairness is implemented using Schnorr signatures. We also present a distributed Fiat-Shamir authentication protocol. The second part of the thesis is devoted to computational improvements, we discuss a method for doubling the speed of Barrett’s algorithm by using specific composite moduli, devise new BCH speed-up strategies using polynomial extensions of Barrett’s algorithm, describe a new backtracking-based multiplication algorithm suited for lightweight microprocessors and present a new number theoretic error-correcting code. Fault injection attacks are further overviewed and a new fault attack on ECC implementations is proposed
Bian, Song. "Realizing Homomorphic Secure Protocols through Cross-Layer Design Techniques." Kyoto University, 2019. http://hdl.handle.net/2433/242926.
Full textKatila, Charles Jumaa <1985>. "Medium Access Control and Routing Protocols Design for 5G." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amsdottorato.unibo.it/8638/1/Katila_PhD_Thesis.pdf.
Full textChae, Youngsu. "Algorithms, protocols and services for scalable multimedia streaming." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/8148.
Full textSala, Dolors. "Design and evaluation of MAC protocols for hybrid fiber/coaxial systems." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/13268.
Full textTéllez, Isaac Jesús Augusto. "Design of secure mobile payment protocols for restricted connectivity scenarios." Doctoral thesis, Universitat Politècnica de Catalunya, 2012. http://hdl.handle.net/10803/96918.
Full textSaleh, Kassem Afif. "Synthesis methods for the design and validation of communication protocols." Thesis, University of Ottawa (Canada), 1991. http://hdl.handle.net/10393/7786.
Full textDi, Marco Piergiuseppe. "Modeling and Design of Wireless Protocols for Networked Control Applications." Doctoral thesis, KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-107411.
Full textQC 20121212
Jerjees, Zina. "Design of interface selection protocols for multi-homed wireless networks." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/7372.
Full textPanzieri, Fabio. "Design and development of communication protocols for local area networks." Thesis, University of Newcastle Upon Tyne, 1985. http://hdl.handle.net/10443/2114.
Full textRiliskis, Laurynas. "On design of dependable communication protocols for wireless sensor networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-18357.
Full textGodkänd; 2011; 20110322 (lauril); LICENTIATSEMINARIUM Ämnesområde: Datorkommunikation/Computer Networking Examinator: Associate Professor Evgeny Osipov, Institutionen för system- och rymdteknik, Luleå tekniska universitet Diskutant: Professor Marko Hännikäinen, Tampere University of Technology, Department of Computer Systems, Finland Tid: Tisdag den 19 april 2011 kl 10.15 Plats: A109, Luleå tekniska universitet
Toor, Yasser. "Design and optimization of broadcast and MAC protocols for VANETs." Paris 6, 2009. http://www.theses.fr/2009PA066697.
Full textHill, Martin R. "The design of robust protocols for distributed real-time systems." Thesis, Aston University, 1990. http://publications.aston.ac.uk/8077/.
Full textWeng, Chunhua. "Supporting collaborative clinical trial protocol writing through an annotation design /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7155.
Full textMarcadet, Gaël. "Design of Secure Multi-User Protocols : Application to Bandits, Ticketing and File Transfer." Electronic Thesis or Diss., Université Clermont Auvergne (2021-...), 2024. http://www.theses.fr/2024UCFA0055.
Full textA cryptographic protocol establishes a series of interactions among users to deliver a given functionality while ensuring various properties, a protocol being considered secure when it successfully ensures all intended properties. Accomplishing these properties requires the need of cryptographic primitives, whose usage may entail computation overhead, limiting the scalability of the protocol. Throughout this manuscript, we focus on three problems dealing with multiple users. The first contribution focuses on the design of a federated multi-armed bandits framework where a federation server, acting as a learning agent, sequentially pulls a bandit arm, the environment responding with a reward coming from an unknown distribution associated with the chosen bandit. In this contribution, we introduce Tango, a secure federated multi-armed bandits protocol fixing and extending our initial attempt Samba shown to be insecure. Tango is proved to prevent the federation server to learn the reward distribution, the obtained rewards and the pulled bandit arm, at the cost of a large computation overhead due to the usage of expensive cryptographic primitives. In the second part of this contribution, we introduce Salsa a secure federated multi-armed bandits protocol moving away from the blueprint of Samba and Tango, still preventing the federation server to learn sensitive data while achieving high-performance. The second contribution of this manuscript addresses a problem involving a large number of users, since it concerns the design of a ticketing system. Indeed, despite the high-demand, these systems provide very restricted guarantees. For instance, one may easily resell a ticket twice. To go further, tickets are nominative, revealing the identity of the ticket's owner. Using standard cryptographic primitives, we propose two scalable ticketing systems called Applause and Spotlight, ensuring anonymity of users while featuring ticket purchasing, ticket refunding, ticket validation and ticket transferability. The difference between Applause and Spotlight lies in the ability to recover the identity of an attendee: In Applause, the anonymity of every user is guaranteed at any time, a property that still hold with Spotlight except for an additional third-party able to recover the identity of an attendee, at the cost of a slightly longer ticket validation. Our third and final contribution deals with the problem of file transfer by broadcasting, which involves sharing a file with a group of users. The trivial solution of storing files on a single, publicly accessible server falls short for instance when the server is down or when the server handles a high number of requests. In this contribution, we introduce a universally composable and efficient protocol allowing one to share a file with a specified group of users while ensuring confidentiality, integrity of the file and sender authentication
Krishnamurthy, Rajaram B. "Scalable real-time architectures and hardware support for high-speed QoS packet schedulers." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/8196.
Full textAbrougui, Kaouther. "Design and Performance Evaluation of Service Discovery Protocols for Vehicular Networks." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20246.
Full textSivabalan, Muthurajah. "Design and performance evaluation of routing protocols for connection-oriented networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/NQ35978.pdf.
Full textUlfsnes, Rasmus. "Design of a Snoop Filter for Snoop Based Cache Coherency Protocols." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22383.
Full textLacks, Daniel Jonathan. "MODELING, DESIGN AND EVALUATION OF NETWORKING SYSTEMS AND PROTOCOLS THROUGH SIMULATION." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3792.
Full textPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Engineering PhD
Al-Janabi, Thair. "Design of energy efficient protocols-based optimisation algorithms for IoT networks." Thesis, Brunel University, 2018. http://bura.brunel.ac.uk/handle/2438/17121.
Full textBaptiste, Cavarec. "Design and Study of Passive Localisation Protocols Using Commercial UWB Radios." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199920.
Full textBehovet av noggranna positioneringssystem har uppkommit moderna samhället efterssom system såsom GPS och basstationsstödd lokalisering av mobilerin klarar att ge tillräckligt god noggrannhet för inomhuspositionering. Ultrabredbandig radio (UWB) är en god kandidat för inomhuspositioneringssystemeftersom det potentiellt ger en noggrannhet ned på centimeternivå. Schemabaserad positionering är en nyligen introducerad metod som baseraspå meddelanden som sänds mellan asynkrona referensnoder enligt ett givetschema, med specifika fördröjningar. Det har visats att en nod kan lokalisera sig själv genom att lyssna på meddelandena från referensnoderna, undervissa antaganden om sändschemat. Metoden har varit utformad för att fungerapå billiga UWB-enheter, men har fram tills nu inte implementerats på riktighårdvara. Huvudsyftet med detta projekt har varit att implementera ett sådan sys-tem mha kommersiellt tillgängliga UWB-enheter (Decawave DW100) och attutforma protokoll som kan kompensera för hårdvarufel och -begränsningar. Denna avhandling föreslår en utförlig mätmodel för schemabaserad positionering med riktiga enheter och presenterar de utmaningar som behövde hanterasi implementeringen på EVK1000-enheter. Dessutom presenteras en utökning avschemabaserad positionering för scenarior där kommunikationen mellan vissanoder är blockerad. Slutligen ger vi en experimentell resultatanalys och jäm-förelse med simuleringar och hybrida Cramér Rao-gränser.
Curran, Phillip. "A formal approach to the analysis and design of communications protocols." Thesis, Queen Mary, University of London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393161.
Full textMitchel, Robert Raymondl III. "Design and Analysis of Intrusion Detection Protocols in Cyber Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19338.
Full textThe design part includes host IDS, system IDS and IDS response designs. The validation part includes a novel model-based analysis methodology with simulation validation. Our objective is to maximize the CPS reliability or lifetime in the presence of malicious nodes performing attacks which can cause security failures. Our host IDS design results in a lightweight, accurate, autonomous and adaptive protocol that runs on every node in the CPS to detect misbehavior of neighbor nodes based on state-based behavior specifications. Our system IDS design results in a robust and resilient protocol that can cope with malicious, erroneous, partly trusted, uncertain and incomplete information in a CPS. Our IDS response design results in a highly adaptive and dynamic control protocol that can adjust detection strength in response to environment changes in attacker strength and behavior. The end result is an energy-aware and adaptive IDS that can maximize the CPS lifetime in the presence of malicious attacks, as well as malicious, erroneous, partly trusted, uncertain and incomplete information.
We develop a probability model based on stochastic Petri nets to describe the behavior of a CPS incorporating our proposed intrusion detection and response designs, subject to attacks by malicious nodes exhibiting a range of attacker behaviors, including reckless, random, insidious and opportunistic attacker models. We identify optimal intrusion detection settings under which the CPS reliability or lifetime is maximized for each attacker model. Adaptive control for maximizing IDS performance is achieved by dynamically adjusting detection and response strength in response to attacker strength and behavior detected at runtime. We conduct extensive analysis of our designs with four case studies, namely, a mobile group CPS, a medical CPS, a smart grid CPS and an unmanned aircraft CPS. The results show that our adaptive intrusion and response designs operating at optimizing conditions significantly outperform existing anomaly-based IDS techniques for CPSs.
Ph. D.
Gaddam, Shravya. "Design and Implementation of PUF Based Protocols for Remote Integrity Verification." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71865.
Full textMaster of Science
Berrian, Joshua. "AN AUTOMATED TEST STATION DESIGN USED TO VERIFY AIRCRAFT COMMUNICATION PROTOCOLS." DigitalCommons@CalPoly, 2011. https://digitalcommons.calpoly.edu/theses/635.
Full textTRAVERSO, STEFANO. "Design of Algorithms and Protocols for Peer-To-Peer Streaming Systems." Doctoral thesis, Politecnico di Torino, 2012. http://hdl.handle.net/11583/2497192.
Full textWilkenloh, Christopher Joselane. "Design of a reliable message transaction protocol." Thesis, Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/8307.
Full textWang, Yunsheng. "Designing Efficient Routing Protocols in Delay Tolerant Networks." Diss., Temple University Libraries, 2013. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/224066.
Full textPh.D.
This thesis presents the design and evaluation of routing protocols for efficient content delivery and dissemination in delay tolerant networks. With the advancement in technology, the communication devices with wireless interfaces become more and more universal. Delay tolerant networks (DTNs) are characterized by intermittent connectivity and limited network capacity. There exist several different application scenarios: connectivity of developing countries, vehicular DTN road communications, and social contact networks. In this thesis, we explore the characteristics in DTNs, such as mobility pattern, contact history information, and social feature information, to design efficient routing schemes. The research reported in this thesis investigates the technical challenges and their solutions of applying different DTN routing protocols. We design multicast schemes to forward the information to a group of destinations in DTN environment. We extend the delegation forwarding scheme in DTN multicasting. An non-replication multicast tree is also studied in this report. We also apply ticket-based and social-tie-based approaches in content distribution systems. We leverage the users' social feature information to study the hypercube-based routing schemes in social contact networks. We also study the resource management problem in DTNs. We design a joint replication-migration-based scheme to solve the storage congestion. These techniques are evaluated comprehensively in realistic simulation studies, by comparing the performance with state-of-the-art approaches in both synthetic and real traces.
Temple University--Theses
吳家寧. "On performance evaluation and protocols design of tree protocol with collision detection." Thesis, 1990. http://ndltd.ncl.edu.tw/handle/73044436994718714046.
Full text