In this paper, the limitation of the GNY logic about its inability to detect the reflection attacks againstsome authentication protocols is given. An improvemen
The basis of distributed system conformance testing is to test theconformance of each entity with its standard. This paper addresses theapproach to entity confo
The situation of multi-region problemmay often appear when boundary element method (BEM) is applied inpractical problems especially in VLSI-CAD. It is difficult
It is an efficient way for a mobilehost to obtain multicast service via a local multicast router on thevisited network. However, there is a possibility for a te
The effect of self-similar traffic onthe delay of a single queue system is studied through the use of themeasured traffic and models as input process. A model-d
A new network protocol (DemandPriority Protocol) environment can provide more satisfying service fordifferent urgent transmission requests. In this paper, in or