Distributed storage systems with replication are well known for storing large amount of data. A large number of replication is done in order to provide reliability. This makes the system expensive. Various methods have been proposed over time to reduce the degree of replication and yet provide same level of ...Download Now
Use of formal techniques for verifying the security features of electronic commerce protocols would facilitate, the enhancement of reliability of such protocols, thereby increasing their usability. This paper projects the application of logic programming techniques for formal verification of a well referred security and transactions protocol, the Net Bill. The ...Download Now
In Mobile Ad Hoc NETworks (MANETs), routing is a challenging task due to node mobility, traffic and network size. It is very important to analyze the scalability characteristics of the routing protocols with respect to these parameters. Zone Routing Protocol (ZRP) is considered to be one of the most scalable ...Download Now
The authors have shown the security weaknesses of the Liaw et al.'s scheme. The design of the Liaw et al.'s scheme is so weak that anyone can login to the remote system by just intercepting a valid login message. Recently, Liaw et al. proposed a remote user authentication scheme using ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?