PRACTICAL PERFORMANCE ANALYSIS OF UDP/IP AND TCP/IP OVER ATM WITH SPECIAL REGARD TO PROTOCOL, OPERAT

Author(s):  
A. Zehl ◽  
T.P. Kusch
2011 ◽  
Vol 181-182 ◽  
pp. 109-112
Author(s):  
Xian Min Wei

This paper describes several current routing lookup algorithms, to study and analysize the complexity and operating practical performance of these routing lookup algorithms. The results show that although the binary search algorithm is not greatly improved in the searching performance, but in IPv6 environment, because searching performance of multi-branch Trie tree will decrease greatly, thus the superiority of binary search algorithm will be reflected better.


IEEE Network ◽  
1996 ◽  
Vol 10 (3) ◽  
pp. 26-39 ◽  
Author(s):  
B.L. Tierney ◽  
W.E. Johnston ◽  
J.R. Lee ◽  
G. Hoo

2021 ◽  
pp. 109-115
Author(s):  
Eman S. Abushabab ◽  
Mohamed Mahmoud ◽  
Mohamed Saad ◽  
Ahmed Alshal ◽  
Ayman Elnashar

Author(s):  
Martin R. Albrecht ◽  
Torben Brandt Hansen ◽  
Kenneth G. Paterson

Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS 2016) to include an integrity notion. The extended security model encompasses important security goals of SSH that go beyond confidentiality and integrity to include length hiding and denial-of-service resistance properties. Boldyreva et al. also defined and analysed the InterMAC scheme, while Albrecht et al. showed that InterMAC satisfies stronger security notions than all currently available SSH encryption schemes. In this work, we take the InterMAC scheme and make it fully ready for use in practice. This involves several steps. First, we modify the InterMAC scheme to support encryption of arbitrary length plaintexts and we replace the use of Encrypt-then-MAC in InterMAC with modern noncebased authenticated encryption. Second, we describe a reference implementation of the modified InterMAC scheme in the form of the library libInterMAC. We give a performance analysis of libInterMAC. Third, to test the practical performance of libInterMAC, we implement several InterMAC-based encryption schemes in OpenSSH and carry out a performance analysis for the use-case of file transfer using SCP. We measure the data throughput and the data overhead of using InterMAC-based schemes compared to existing schemes in OpenSSH. Our analysis shows that, for some network set-ups, using InterMAC-based schemes in OpenSSH only moderately affects performance whilst providing stronger security guarantees compared to existing schemes.


2013 ◽  
Vol 357-360 ◽  
pp. 2246-2249
Author(s):  
Xi Deng

Performance evaluation for agent construction manager is an important way to manage agent construction manager market. The author studied the SCP (Structure-Conduct-Performance) analysis paradigm. And on this basis, this paper establishes a three-dimensional performance evaluation model, which consists of three dimensions: agent organization, agent conduct and agent performance. Through the questionnaire survey, the author further refined evaluation dimension. Finally this paper sets up a comprehensive and practical performance evaluation index system.


Sign in / Sign up

Export Citation Format

Share Document