Zobrazeno 1 - 10
of 93
pro vyhledávání: '"GENGE, Béla"'
Autor:
Haller, Piroska, Genge, Béla, Forloni, Fabrizio, Baldini, Gianmarco, Carriero, Massimo, Fontaras, Georgios
Publikováno v:
In International Journal of Critical Infrastructure Protection July 2022 37
Publikováno v:
Procedia Computer Science; 2024, Vol. 246, p500-509, 10p
Publikováno v:
In International Journal of Critical Infrastructure Protection June 2019 25:152-168
Publikováno v:
In International Journal of Critical Infrastructure Protection March 2019 24:48-68
Publikováno v:
In Future Generation Computer Systems February 2019 91:206-222
Autor:
Genge, Bela, Haller, Piroska
Application-layer multicast implements the multicast functionality at the application layer. The main goal of application-layer multicast is to construct and maintain efficient distribution structures between end-hosts. In this paper we focus on the
Externí odkaz:
http://arxiv.org/abs/1007.0920
We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the Ethernet layer. Within our platform we use a new security protocol that w
Externí odkaz:
http://arxiv.org/abs/1007.0917
Autor:
Genge, Bela, Haller, Piroska
Publikováno v:
19th International Conference on Computer Science and Energetics-Electrical Engineering, Romania (2009)
We propose a comparative performance evaluation of security protocols. The novelty of our approach lies in the use of a polynomial mathematical model that captures the performance of classes of cryptographic algorithms instead of capturing the perfor
Externí odkaz:
http://arxiv.org/abs/0910.3765
Determining if two protocols can be securely composed requires analyzing not only their additive properties but also their destructive properties. In this paper we propose a new composition method for constructing protocols based on existing ones fou
Externí odkaz:
http://arxiv.org/abs/0908.4325
Autor:
Genge, Bela, Haller, Piroska
We propose a modeling framework for generating security protocol specifications. The generated protocol specifications rely on the use of a sequential and a semantical component. The first component defines protocol properties such as preconditions,
Externí odkaz:
http://arxiv.org/abs/0908.3090