I want to simulate the security protocols (e.g. key exchange protocol).
Assume there two parties(A and B) are communicating each other.
A sending a NONCE; B replying with the ENCRYPTED form of that NONCE with some
key.
(Or he may use EXP, XOR) operations.
Then A authenticating B with DECR
On Monday, December 24, 2012, Sai Bhyravajosyula wrote:
> Hi All
> I am modifying backoff Algorithm
> I have a simple network of 3 parallel flows . THe flow in the middle
scenario.
> I tried to increase the fairness by tweaking the backoff.
> Now i need to see whether the transmitter is backing o