Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2017
/
Article
/
Tab 7
/
Research Article
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
Table 7
The time overhead of implementing protocols.
Name
IDH
IDHS
MADH
MADHS
INS
INSL
MANS
MANSL
Time
0.916
0.789
1.567
0.132
0.037
0.030
0.100
0.096