To see the other types of publications on this topic, follow the link: Protocols.

Dissertations / Theses on the topic 'Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.

Full text
Abstract:
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. Á ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore les carte d’abonnement dans les transports en commun. Afin de sécuriser l’ensemble de ces applications, des protocoles de sécurité, appelés protocoles délimiteurs de distance on été développés. Ces protocoles ont pour objectif d’assurer la proximité physique des appareils mis en jeu afin protocole cryptographique, protocole de paiement de limiter le risque d’a
APA, Harvard, Vancouver, ISO, and other styles
2

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
3

Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne‎ (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.

Full text
Abstract:
Secure communications over the Internet are typically established by first running an authenticated key exchange protocol, which computes a secret key between two users, which is then utilised in an encryption protocol. In this work we examine novel security properties of the most prominent communications protocols, including the Transport Layer Security and Secure Shell protocols. We introduce new security frameworks for analysing security properties of protocols involving negotiation, multiple ciphersuites, long-term key reuse, and time synchronisation. Our results have increased confidence
APA, Harvard, Vancouver, ISO, and other styles
5

Gibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.

Full text
Abstract:
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order to analyse application-layer protocols that depend on an underlying secure transport layer, including unil
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.

Full text
Abstract:
Wireless sensor networks(WSNs) are different to traditional networks and are highly dependent on applications, thus traditional routing protocols cannot be applied efficiently to the networks. As the variability of both the application and the network architecture, the majority of the attention, therefore, has been given to the routing protocols. This work surveys and evaluates state-of-the-art routing protocols based on many factors including energy efficiency, delay andcomplexity, and presents several classifications for the various approaches pursued. Additionally, more attention is paid to
APA, Harvard, Vancouver, ISO, and other styles
7

Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.

Full text
Abstract:
O presente estudo objetivou realizar um levantamento retrospectivo de todos os planejamentos ortodônticos realizados pelo Departamento de Ortodontia (FOB USP) desde 1973, para que pudessem ser avaliados os protocolos de tratamento escolhidos à época, principalmente quanto à decisão de extrações e suas freqüências. A amostra constitui-se inicialmente de 3745 documentações ortodônticas arquivadas pelo Departamento de Ortodontia, das quais 332 documentações foram descartadas seguindo alguns fatores de exclusão, tais como casos transferidos, desistências e informações e exames incompletos. A amo
APA, Harvard, Vancouver, ISO, and other styles
8

Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.

Full text
Abstract:
Dans un monde fortement dépendant de la communication de données distribuées, la conception d’infrastructures sécurisées est une tâche cruciale. Les systèmes et réseaux distribués prennent de plus en plus d’importance, car la plupart des services et des possibilités qui caractérisent la société moderne sont basés sur ces technologies.La communication entre les agents sur les réseaux a donc suscité un grand intérêt pour la recherche. Afin de fournir des moyens de communication efficaces et fiables, de plus en plus de protocoles de communication sont inventés, et pour la plupart d’entre eux, la
APA, Harvard, Vancouver, ISO, and other styles
9

坂部, 俊樹, 正彦 酒井, 圭一朗 草刈, and 直樹 西田. "Verifying Cryptographic Protocols." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jaspan, Ciera N. C. "Proper Plugin Protocols." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/189.

Full text
Abstract:
The ability of the software engineering community to achieve high levels of reuse from software frameworks has been tempered by the difficulty in understanding how to reuse them properly. When written correctly, a plugin can take advantage of the framework’s code and architecture to provide a rich application with relatively few lines of code. Unfortunately, doing this correctly is difficult because frameworks frequently require plugin developers to be aware of complex protocols between objects, and improper use of these protocols causes exceptions and unexpected behavior at run time. This dis
APA, Harvard, Vancouver, ISO, and other styles
11

Attamah, M. K. "Epistemic gossip protocols." Thesis, University of Liverpool, 2015. http://livrepository.liverpool.ac.uk/3001317/.

Full text
Abstract:
In this thesis we study epistemic protocols for gossip. Each agent in the gossip scenario knows a unique piece of information which is called a secret. Agents communicate with each other by means of pairwise telephone calls, and in each call the calling pair of agents exchange all the secrets they currently know. In an epistemic gossip protocol, an agent 'a' can call another agent 'b', not because it is so instructed, but because agent 'a' knows that it satisfies some knowledge-based condition defined by the protocol. The goal of gossiping is typically epistemic, for example, that after a sequ
APA, Harvard, Vancouver, ISO, and other styles
12

Bedrax-Weiss, Tania. "Optimal search protocols /." view abstract or download file of text, 1999. http://wwwlib.umi.com/cr/uoregon/fullcit?p9948016.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 1999.<br>Typescript. Includes vita and abstract. Includes bibliographical references (leaves 206-211). Also available for download via the World Wide Web; free to University of Oregon users. Address: http://wwwlib.umi.com/cr/uoregon/fullcit?p9948016.
APA, Harvard, Vancouver, ISO, and other styles
13

Njoya, Nadine Katia. "Contraction-Expansion Protocols." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/1971.

Full text
Abstract:
An approach to a new class of compounds known as bridgehead dienone is described. The route is based on a tandem contraction-expansion event in which the contraction triggers the expansion. The two steps involved are a palladium-catalyzed Favorskii contraction and a cis-divinyl cyclopropanone rearrangement. Progress towards these goals is reported.
APA, Harvard, Vancouver, ISO, and other styles
14

Shah, Munam Ali. "A novel MAC protocol for cognitive radio networks." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.

Full text
Abstract:
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network
APA, Harvard, Vancouver, ISO, and other styles
15

Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.

Full text
Abstract:
This thesis addresses the problem of conformance testing of communication protocol implementations. Test sequence generation techniques for finite state machines (FSM) have been developed to solve the problem of high costs of an exhaustive test. These techniques also guarantee a complete coverage of an implementation in terms of state transitions and output functions, and therefore provide a sound test of the implementation under test. In this thesis, we have modified and applied three test sequence generation techniques on the class 0 transport protocol. A local tester and executable test
APA, Harvard, Vancouver, ISO, and other styles
16

Muhammad, Shahabuddin. "EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3086.

Full text
Abstract:
Running critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In addition to employing an authentication protocol, one also needs to make sure that the protocol successfu
APA, Harvard, Vancouver, ISO, and other styles
17

Scerri, Guillaume. "Proof of security protocols revisited." Thesis, Cachan, Ecole normale supérieure, 2015. http://www.theses.fr/2015DENS0002/document.

Full text
Abstract:
Avec la généralisation d'Internet, l'usage des protocoles cryptographiques est devenu omniprésent. Étant donné leur complexité et leur l'aspect critique, une vérification formelle des protocoles cryptographiques est nécessaire.Deux principaux modèles existent pour prouver les protocoles. Le modèle symbolique définit les capacités de l'attaquant comme un ensemble fixe de règles, tandis que le modèle calculatoire interdit seulement a l'attaquant derésoudre certain problèmes difficiles. Le modèle symbolique est très abstrait et permet généralement d'automatiser les preuves, tandis que le modèle c
APA, Harvard, Vancouver, ISO, and other styles
18

Kobeissi, Nadim. "Formal verification for real-world cryptographic protocols and implementations." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE065.

Full text
Abstract:
Les particuliers et les organisations comptent de plus en plus sur le Web et sur les applications destinées aux utilisateurs pour des cas d'utilisation comme les services bancaires en ligne, la messagerie sécurisée, le partage de documents et le vote électronique. Pour protéger la confidentialité et l'intégrité de ces communications, ces systèmes dépendent de protocoles d'authentification et d'autorisation, de constructions cryptographiques au niveau de l'application et de protocoles cryptographiques au niveau du transport. Cependant, la combinaison de ces divers mécanismes pour atteindre des
APA, Harvard, Vancouver, ISO, and other styles
19

Sadrin, Stéphane. "Evaluation du bénéfice chez l'homme des probiotiques dans la prise en charge du syndrome de l'intestin irritable : méthodologie de l'essai contrôlé randomisé et allégations nutritionnelles et de santé." Thesis, Toulon, 2017. http://www.theses.fr/2017TOUL0007/document.

Full text
Abstract:
Une allégation de santé dans l’UE nécessite des preuves cliniques de l’efficacité et de la sécuritéd’une supplémentation nutrititionnelle. Les probiotiques, en particulier les bactéries lactiques,rentrent dans ce cadre règlementaire dans lequel l’EFSA indique que les preuves obtenues chez despatients avec des troubles fonctionnels intestinaux sont transposables chez une population de sujetssains. Le protocole LAPIBSS est un essai clinique de haute qualité méthodologique évaluantl’efficacité de 2 souches de Lactobacillus acidophilus à diminuer la sévérité des symptômes dusyndrome de l’intestin
APA, Harvard, Vancouver, ISO, and other styles
20

Wibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.

Full text
Abstract:
Network protocol construction is a complex and error prone task. The challenges originate both from the inherent complexity of developing correct program code and from the distributed nature of networked systems. Protocol errors can have devastating consequences. Even so, methods for ensuring protocol correctness are currently only used to a limited extent. A central reason for this is that they are often complex and expensive to employ. In this thesis, we develop methods to perform network protocol testing and verification, with the goal to make the techniques more accessible and re
APA, Harvard, Vancouver, ISO, and other styles
21

Steine, Asgeir. "Privacy-Preserving Cryptographic Protocols." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-17284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Williams, Douglas E. "Fault-tolerant authentication protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0020/NQ58112.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Clayton, Richard Vincent. "Structuring and destructuring protocols." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Papanikolaou, Nikolaos K. "Model checking quantum protocols." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/2236/.

Full text
Abstract:
This thesis describes model checking techniques for protocols arising in quantum information theory and quantum cryptography. We discuss the theory and implementation of a practical model checker, QMC, for quantum protocols. In our framework, we assume that the quantum operations performed in a protocol are restricted to those within the stabilizer formalism; while this particular set of operations is not universal for quantum computation, it allows us to develop models of several useful protocols as well as of systems involving both classical and quantum information processing. We detail the
APA, Harvard, Vancouver, ISO, and other styles
25

Chang, Che-Hao Albert. "Reasoning about security protocols." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Luo, Yi. "Spatio-temporal negotiation protocols." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4972.

Full text
Abstract:
Canonical problems are simplified representations of a class of real world problems. They allow researchers to compare algorithms in a standard setting which captures the most important challenges of the real world problems being modeled. In this dissertation, we focus on negotiating a collaboration in space and time, a problem with many important real world applications. Although technically a multi-issue negotiation, we show that the problem can not be represented in a satisfactory manner by previous models. We propose the "Children in the Rectangular Forest" (CRF) model as a possible canoni
APA, Harvard, Vancouver, ISO, and other styles
27

Wei, K.-K. "Modelling of communication protocols." Thesis, University of York, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Powell, Dave, and Paul Cook. "Community of Programming Protocols." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/606110.

Full text
Abstract:
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>As new products are developed for the telemetry market, network interfaces are being used for set-up and control. This paper describes the programmability of various telemetry components that are now available and discusses the internal status functions that can be returned to the user or telemetry system via the same interface that are good indicators of system health. Possible control interf
APA, Harvard, Vancouver, ISO, and other styles
29

Oberdan, Thomas. "Protocols, truth and convention." Amsterdam ; Atlanta, GA : Rodopi, 1993. http://catalogue.bnf.fr/ark:/12148/cb35609110v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nuggehalli, Pavan S. "Energy conscious communication protocols /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2003. http://wwwlib.umi.com/cr/ucsd/fullcit?p3091328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Iyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Kang. "Modeling the bandwidth sharing behavior of congestion controlled flows /." Full text open access at:, 2002. http://content.ohsu.edu/u?/etd,632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Barros, Gavilanes Juan Gabriel. "Réseaux de capteurs pour applications de suivi médical." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/10664/1/barros.pdf.

Full text
Abstract:
Le maintien des personnes à domicile est une perspective sérieusement envisagée dans le contexte actuel de vieillissement de la population. Selon les statistiques, près d'un habitant sur trois aurait plus de 60 ans en 2050, contre un sur cinq en 2005. Cependant, les solutions actuelles de téléassistance (bouton alarme sur un collier par exemple) ont montré leurs limites. La thèse consiste à étudier des applications du futur permettant de fournir à une personne maintenue à domicile ou à l’hôpital une meilleure solution alternative fondée sur les réseaux de capteurs, capable de mesurer certai
APA, Harvard, Vancouver, ISO, and other styles
35

Lu, Jing. "Semi-automatic protocol implementation using an Estelle-C compiler, LAPB and RTS protocols as examples." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29419.

Full text
Abstract:
Formal Description Techniques allow for the use of automated tools during the specification and development of communication protocols. Estelle is a standardized formal description technique developed by ISO to remove ambiguities in the specification of communication protocols and services. The UBC Estelle-C compiler automates the implementation of protocols by producing an executable C implementation directly from its Estelle specification. In this thesis, we investigate the automated protocol implementation methodology using the Estelle-C compiler. First, we describe the improvements mad
APA, Harvard, Vancouver, ISO, and other styles
36

Maciel, Luciana França Smith. "Expressão dos receptores endometriais de estrógeno e progesterona em éguas acíclicas após administração de progesterona." Botucatu, 2017. http://hdl.handle.net/11449/151275.

Full text
Abstract:
Orientador: Cezinande de Meira<br>Resumo: Progesterone (P4) is frequently used after the administration of estradiol, to prepare seasonal non-cyclic mares as embryo recipients, however previous studies have reported gestation of seasonal non-cyclic mares treated only with P4. The objective of the present study was to evaluate the gene and protein expression of estrogen receptor alpha (ERα), estrogen beta (ERβ) and progesterone (PR) in the endometrium of seasonal non-cyclic mares treated with long acting progesterone (LAP4). Eight mares were used during the seasonal anoestrus phase, uterine bio
APA, Harvard, Vancouver, ISO, and other styles
37

Koegler, Xavier. "Population protocols, games and large populations." Paris 7, 2012. http://www.theses.fr/2012PA077132.

Full text
Abstract:
Le modèle des populations protocols a été proposé pour capturer les spécificités de réseaux opportunistes constitués d'une population d'agents mobiles à la mémoire limitée capables de communications sans fil par paires. L'objet de cette thèse est d'étendre la compréhension et l'analyse des population protocols ainsi que leurs liens avec d'autres modèles de dynamiques de populations. La première contribution de cette thèse est l'étude de la traduction en terme de protocoles de population de la dynamique d'une population d'agents jouant à un jeu de manière répétée les uns contre les autres et ad
APA, Harvard, Vancouver, ISO, and other styles
38

Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Full text
Abstract:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagra
APA, Harvard, Vancouver, ISO, and other styles
40

Curty, Alonso Marcos. "Cryptographic protocols in optical communication." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=979048621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gheorghiu, Steluta. "Network coding for transport protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2011. http://hdl.handle.net/10803/32195.

Full text
Abstract:
With the proliferation of smart devices that require Internet connectivity anytime, anywhere, and the recent technological advances that make it possible, current networked systems will have to provide a various range of services, such as content distribution, in a wide range of settings, including wireless environments. Wireless links may experience temporary losses, however, TCP, the de facto protocol for robust unicast communications, reacts by reducing the congestion window drastically and injecting less traffic in the network. Consequently the wireless links are underutilized and the
APA, Harvard, Vancouver, ISO, and other styles
42

Jaafar, Talal Mohamed. "Simulation-Based Routing Protocols Analyses." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16197.

Full text
Abstract:
A new approach to distributed network simulations that eases the burdens on the simulation developer in creating space-parallel simulations is presented. It provides a full-topology knowledge for every federate (simulator instance) to make the best routing decision to destinations simulated at other federates. Later, this technique was used to characterize the benefits of IP Anycast mechanism at large scale. Different IP Anycast scenarios were simulated in a detailed Border Gateway Protocol (BGP) simulator using a realistic large-scale AS topology. Results indicated that Anycast indeed pro
APA, Harvard, Vancouver, ISO, and other styles
43

Mohammed, Alalelddin Fuad Yousif. "Studying Media Access andControl Protocols." Thesis, KTH, Kommunikationssystem, CoS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91193.

Full text
Abstract:
This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) resources and the knowledge of undergraduate students. This was necessary because the existing document i
APA, Harvard, Vancouver, ISO, and other styles
44

Donta, Praveen Kumar. "Performance Analysis of Security Protocols." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.

Full text
Abstract:
Security is critical to a wide range of applications and services. Numerous security mechanisms and protocols have been developed and are widely used with today’s Internet. These protocols, which provide secrecy, authentication, and integrity control, are essential to protecting electronic information. There are many types of security protocols and mechanisms, such as symmetric key algorithms, asymmetric key algorithms, message digests, digital certificates, and secure socket layer (SSL) communication. Symmetric and asymmetric key algorithms provide secrecy. Message digests are used for authen
APA, Harvard, Vancouver, ISO, and other styles
45

Haqqani, Mujeeb. "Fast prototyping of communication protocols." Thesis, University of Ottawa (Canada), 1990. http://hdl.handle.net/10393/5718.

Full text
Abstract:
In this thesis we present a methodology and a life-cycle system for rapid implementation of communication protocols. Our proposed approach includes a scheme for automated coding and decoding of protocol (single module) formal specifications in Estelle into (and from) a KnowledgeBase(KB). An interactive experimental system, FPCP (Fast Prototyping of Communication Protocols), is designed and implemented. It automatically generates an interrogatable KnowledgeBase representation of the specification, and automatically generates an executable prototype of communication software corresponding to the
APA, Harvard, Vancouver, ISO, and other styles
46

Bergström, Patrik. "Automated Setup of Display Protocols." Thesis, Linköpings universitet, Databas och informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117745.

Full text
Abstract:
Radiologists' workload has been steadily increasing for decades. As digital technology matures it improves the workflow for radiology departments and decreases the time necessary to examine patients. Computer systems are widely used in health care and are for example used to view radiology images. To simplify this, display protocols based on examination data are used to automatically create a layout and hang images for the user. To cover a wide variety of examinations hundreds of protocols must be created, which is a time-consuming task and the system can still fail to hang series if strict re
APA, Harvard, Vancouver, ISO, and other styles
47

Long, Nguyen Hoang. "Authentication protocols in pervasive computing." Thesis, University of Oxford, 2009. https://ora.ox.ac.uk/objects/uuid:d21c0ce6-5dd6-43ef-b6c6-01346d02031b.

Full text
Abstract:
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably identity theft, and creates new requirements for secure communication. A recently proposed approach to creating secure communication is to use human trust and human interactions. These approaches potentially eliminate the need for passwords as in Bluetooth, shared secrets or trusted parties, which are often too complex and expensive to use in portable devices. In this new technology, handheld devices exchange data (e.g. payment, heart rates or public keys) over some medium (e.g. WiFi) and then displ
APA, Harvard, Vancouver, ISO, and other styles
48

Gonzãlez-Deleito, Collell Nicolãs. "Trust relationships in exchange protocols." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210963.

Full text
Abstract:
Les protocoles d'échange d'informations représentent un des grands domaines actuels de recherche en sécurité informatique, et sont entre autres à la base des mécanismes de commerce électronique. Ils sont par exemple nécessaires à la réalisation d'un achat en ligne, à la signature d'un contrat électronique et au courrier électronique recommandé. Dans ces exemples, les échanges d'informations consistent à échanger respectivement un objet électronique contre un paiement, des signatures digitales sur un même contrat, et un courrier électronique contre un accusé de réception.<p><p>Informellement, u
APA, Harvard, Vancouver, ISO, and other styles
49

Koh, Sunny. "Stratified protocols for mobile gaming." University of Southern Queensland, Faculty of Sciences, 2006. http://eprints.usq.edu.au/archive/00003851/.

Full text
Abstract:
[Abstract]: Mobile Games are becoming very popular. Players play games under various conditions and so we need protocols which can adapt. However, unlike the desktop, there are many issues with that of mobile communication. This dissertation proposes a stratified protocol to be implemented in order to solve these communication problems more effectively. The protocol itself dynamically adapts to the changing bandwidth capacity of the network. The term stratified means that the payload in the protocol packets is subdivided into different categories, or strata, of data which are handled different
APA, Harvard, Vancouver, ISO, and other styles
50

Ehikioya, Sylvanus Agbonifoh. "Specification of transaction systems protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/nq23597.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!