|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 4158 occurrences of 2094 keywords
|
|
|
Results
Found 8179 publication records. Showing 8179 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 215-233, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
77 | Xingwu Liu, Juhua Pu, Jianzhong Pan |
A Classification of Degenerate Loop Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP TCS ![In: Fifth IFIP International Conference On Theoretical Computer Science - TCS 2008, IFIP 20th World Computer Congress, TC 1, Foundations of Computer Science, September 7-10, 2008, Milano, Italy, pp. 203-213, 2008, Springer, 978-0-387-09679-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
loop agreement, classification, distributed computing, computability |
67 | Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal, Corentin Travers |
On the computability power and the robustness of set agreement-oriented failure detector classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 21(3), pp. 201-222, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Fault-tolerance, Distributed algorithm, Asynchronous system, Unreliable failure detector, Set-agreement |
62 | Carlos Müller, Manuel Resinas, Antonio Ruiz Cortés |
Explaining the Non-compliance between Templates and Agreement Offers in WS-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC/ServiceWave ![In: Service-Oriented Computing, 7th International Joint Conference, ICSOC-ServiceWave 2009, Stockholm, Sweden, November 24-27, 2009. Proceedings, pp. 237-252, 2009, 978-3-642-10382-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Quality of Service, Debugging, Service Level Agreement, SLA, Explanations, WS-Agreement, Compliance Checking |
62 | Wei Chen 0013, Jialin Zhang 0001, Yu Chen, Xuezheng Liu |
Weakening Failure Detectors for k -Set Agreement Via the Partition Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, pp. 123-138, 2007, Springer, 978-3-540-75141-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
partitioned failure detectors, Failure detector, k-set agreement |
62 | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin |
On the composition of authenticated Byzantine Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 53(6), pp. 881-917, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authenticated Byzantine Agreement, lower bounds, randomized protocols, protocol composition |
58 | Ratna Dutta, Rana Barua, Palash Sarkar 0001 |
Provably Secure Authenticated Tree Based Group Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 92-104, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
provable security, bilinear pairing, group key agreement, authenticated key agreement |
57 | Hoonjung Lee, Donghyun Kim 0001, Sangjin Kim, Heekuck Oh |
Identity-Based Key Agreement Protocols in a Multiple PKG Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, pp. 877-886, 2005, Springer, 3-540-25863-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multiple PKG, bilinear map, key agreement protocol, ID-based cryptosystem |
56 | Shafi Goldwasser, Yehuda Lindell |
Secure Computation without Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 16th International Conference, DISC 2002, Toulouse, France, October 28-30, 2002 Proceedings, pp. 17-32, 2002, Springer, 3-540-00073-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Rana Barua, Ratna Dutta, Palash Sarkar 0001 |
Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 205-217, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement |
53 | Malte Borderding |
Levels of Authentication in Distributed Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 10th International Workshop, WDAG '96, Bologna, Italy, October 9-11, 1996, Proceedings, pp. 40-55, 1996, Springer, 3-540-61769-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
crusader agreement, fault tolerance, distributed systems, authentication, Byzantine agreement |
52 | Keren Censor-Hillel |
Multi-sided shared coins and randomized set-agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2010: Proceedings of the 22nd Annual ACM Symposium on Parallelism in Algorithms and Architectures, Thira, Santorini, Greece, June 13-15, 2010, pp. 60-68, 2010, ACM, 978-1-4503-0079-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
multi-valued shared coins, distributed computing, randomized algorithms, shared memory, set-agreement |
52 | Eli Gafni, Rachid Guerraoui, Bastian Pochon |
From a static impossibility to an adaptive lower bound: the complexity of early deciding set agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 714-722, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
early decision, simulation, reduction, set agreement |
52 | Michael Steiner 0001, Gene Tsudik, Michael Waidner |
Key Agreement in Dynamic Peer Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 11(8), pp. 769-780, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
decision Diffie-Hellman problem, dynamic peer groups, key establishment/agreement protocols, cryptography, Collaborative work, multiparty computation, communication system security |
50 | Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa 0001 |
A Protocol for Making an Agreement in a Peer-to-Peer (P2P) Society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 1-6, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Kilho Shin, Tetsuji Kuboyama |
Kernels Based on Distributions of Agreement Subtrees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Conference on Artificial Intelligence ![In: AI 2008: Advances in Artificial Intelligence, 21st Australasian Joint Conference on Artificial Intelligence, Auckland, New Zealand, December 1-5, 2008. Proceedings, pp. 236-246, 2008, Springer, 978-3-540-89377-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal, Corentin Travers |
Irreducibility and additivity of set agreement-oriented failure detector classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, PODC 2006, Denver, CO, USA, July 23-26, 2006, pp. 153-162, 2006, ACM, 1-59593-384-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerance, asynchronous system, unreliable failure detector |
50 | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin |
On the composition of authenticated byzantine agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada, pp. 514-523, 2002, ACM, 1-58113-495-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Marco Aiello 0001, Ganna Frankova, Daniela Malfatti |
What's in an Agreement? An Analysis and an Extension of WS-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2005, Third International Conference, Amsterdam, The Netherlands, December 12-15, 2005, Proceedings, pp. 424-436, 2005, Springer, 3-540-30817-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Vincent Berry, Zeshan Peng, H. F. Ting |
From Constrained to Unconstrained Maximum Agreement Subtree in Linear Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 50(3), pp. 369-385, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Maximum agreement subtrees, Constrained maximum agreement subtrees, Bioinformatics, Consensus, Reduction, Evolutionary trees |
48 | Carlos Müller, Octavio Martín-Díaz, Antonio Ruiz Cortés, Manuel Resinas, Pablo Fernandez 0001 |
Improving Temporal-Awareness of WS-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2007, Fifth International Conference, Vienna, Austria, September 17-20, 2007, Proceedings, pp. 193-206, 2007, Springer, 978-3-540-74973-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Temporal-Aware, Quality of Service, Service Level Agreement, Utility Functions, WS-Agreement |
48 | Eun-Jun Yoon, Kee-Young Yoo |
A New Simple Authenticated Key Agreement and Protected Password Change Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 955-964, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Password change, Dffie-Hellman key agreement, Authentication, Cryptography, Password, Key agreement |
48 | Yijuan Shi, Gongliang Chen, Jianhua Li 0001 |
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 757-761, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bilinear parings, Key agreement, group key agreement, ID-based cryptography |
47 | Rachid Guerraoui, André Schiper |
The Generic Consensus Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 27(1), pp. 29-41, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fault-tolerant agreement protocols, view synchrony, total order multicast, modularity, consensus, failure detectors, Asynchronous distributed systems, group membership, atomic commitment |
47 | Antoine Pichot, Oliver Wäldrich, Wolfgang Ziegler, Philipp Wieder |
Towards Dynamic Service Level Agreement Negotiation: An Approach Based on WS-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST (Selected Papers) ![In: Web Information Systems and Technologies, 4th International Conference, WEBIST 2008, Funchal, Madeira, Portugal, May 4-7, 2008, Revised Selected Papers, pp. 107-119, 2008, Springer, 978-3-642-01343-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Quality of service, Negotiation, Service level agreement, Commit Protocol, Web services agreement |
46 | Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang |
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 540-544, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ellipse curve, bilinear pairing, group key agreement, secure group communication |
46 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Robust group key agreement using short broadcasts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 411-420, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fault tolerance, group key agreement |
46 | Hongsong Shi, Mingxing He, Zhiguang Qin |
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 73-89, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Clustering, Ad hoc networks, Bilinear pairings, Group key agreement, Hierarchical routing |
46 | Takeshi Okamoto, Raylin Tso, Eiji Okamoto |
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, Second International Conference, MDAI 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings, pp. 122-133, 2005, Springer, 3-540-27871-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, Cryptography, key agreement, pairing, ID-based |
46 | Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal |
The combined power of conditions and failure detectors to solve asynchronous set agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 179-188, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
shared memory, consensus, asynchronous system, failure detection, condition, snapshot, process crash, set agreement |
46 | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik |
Secure Group Communication Using Robust Contributory Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 15(5), pp. 468-480, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
contributory group key agreement, fault tolerance, distributed systems, group communication, cryptographic protocols, network protocols, Security and protection |
45 | Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Corentin Travers |
Of Choices, Failures and Asynchrony: The Many Faces of Set Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 20th International Symposium, ISAAC 2009, Honolulu, Hawaii, USA, December 16-18, 2009. Proceedings, pp. 943-953, 2009, Springer, 978-3-642-10630-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Michel Hurfin, Raimundo A. Macêdo, Michel Raynal, Frederic Tronel |
A General Framework to Solve Agreement Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: The Eighteenth Symposium on Reliable Distributed Systems, SRDS 1999, Lausanne, Switzerland, October 19-22, 1999, Proceedings, pp. 56-65, 1999, IEEE Computer Society, 0-7695-0290-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
44 | Zvi Galil, Alain J. Mayer, Moti Yung |
Resolving Message Complexity of Byzantine Agreement and beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, USA, 23-25 October 1995, pp. 724-733, 1995, IEEE Computer Society, 0-8186-7183-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Malicious, early stopping agreement protocols, distributed work performance, reliability, distributed algorithms, distributed computing, fault tolerant computing, message passing, message passing, optimisation, fault models, communication complexity, Byzantine Agreement, agreement, message complexity, linear time, workstation network, Crash, Omission, adaptive parallelism |
43 | Nrupen Chudasma, Sanjay Chaudhary |
Service composition using service selection with WS-agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009, pp. 21, 2009, ACM, 978-1-60558-476-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
service level objective (SLO), service-oriented computing (SOC), ontology, web services, service composition, service level agreement (SLA), WS-agreement, MCDM |
43 | Hsien-Sheng Hsiao, Yeh-Hao Chin, Wei-Pang Yang |
Reaching Fault Diagnosis Agreement under a Hybrid Fault Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 49(9), pp. 980-986, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
fault diagnosis agreement, mixed fault model, Byzantine agreement, fault-tolerant distributed system, hybrid fault model |
41 | Guanfeng Liang, Nitin H. Vaidya |
Brief announcement: capacity of byzantine agreement with finite link capacity - complete characterization of four-node networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010, pp. 396-397, 2010, ACM, 978-1-60558-888-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
byzantine agreement |
41 | Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Anne-Marie Kermarrec |
Brief announcement: byzantine agreement with homonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2010: Proceedings of the 22nd Annual ACM Symposium on Parallelism in Algorithms and Architectures, Thira, Santorini, Greece, June 13-15, 2010, pp. 74-75, 2010, ACM, 978-1-4503-0079-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authentication, message-passing, consensus, byzantine agreement |
41 | François Bonnet 0001, Michel Raynal |
Conditions for Set Agreement with an Application to Synchronous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 24(3), pp. 418-433, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
lower bound, efficiency, condition, synchronous system, agreement problem |
41 | Mi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu |
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 413-425, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks (WSNs), Authentication, Continuity, Group key agreement, Group key |
41 | Valerie King, Jared Saia |
Brief announcement: fast scalable Byzantine agreement in the full information model with a nonadaptive adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, PODC 2009, Calgary, Alberta, Canada, August 10-12, 2009, pp. 304-305, 2009, ACM, 978-1-60558-396-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
asychrony, communication complexity, gossiping, leader election, byzantine agreement, message complexity, synchrony |
41 | Carlos Carrascosa, Miguel Rebollo |
Agreement spaces for counselor agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1205-1206, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
counselor, context, CSP, agreement |
41 | Sven Laur, Sylvain Pasini |
SAS-Based Group Authentication and Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 197-213, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Groups, key agreement, message authentication, multi-party |
41 | Roy Friedman, Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal |
Asynchronous Agreement and Its Relation with Error-Correcting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 56(7), pp. 865-875, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
erroneous value, fault tolerance, distributed computing, error-correcting code, consensus, Hamming distance, asynchronous distributed system, condition, crash failure, coding theory, Agreement problem, interactive consistency |
41 | Yongping Zhang, Wei Wei, Tianjie Cao |
Improvement of an Authenticated Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 593-601, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Elliptic Curves, Key Agreement Protocol |
41 | Kiran Lakkaraju, Les Gasser |
A unified framework for multi-agent agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 21, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi agent agreement problems, multi agent systems, language evolution |
41 | Giovanni Di Crescenzo, Maria Striki, John S. Baras |
Modeling key agreement in multi-hop ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 39-44, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
topology driven protocols, performance evaluation, optimization, approximation algorithms, efficiency, group key agreement |
41 | Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang |
Zone-Oriented Byzantine Agreement on Zone-Based Wireless Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings, pp. 853-862, 2006, Springer, 3-540-39368-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
zone-based wireless ad-hoc network, malicious fault, fault-tolerance, distributed system, Byzantine agreement |
41 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 521-532, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authenticated group key agreement, cryptography, bilinear pairings, ID-based |
41 | Tarjei K. Mandt, Chik How Tan |
Certificateless Authenticated Two-Party Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 37-44, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bilinear map, authenticated key agreement, Certificateless public key cryptography |
41 | Ariel Daliot, Danny Dolev |
Self-stabilizing byzantine agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, PODC 2006, Denver, CO, USA, July 23-26, 2006, pp. 143-152, 2006, ACM, 1-59593-384-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
pulse synchronization, self-stabilization, byzantine agreement, byzantine faults, reliable broadcast, transient failures |
41 | Michel Raynal, Corentin Travers |
In Search of the Holy Grail: Looking for the Weakest Failure Detector for Wait-Free Set Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 10th International Conference, OPODIS 2006, Bordeaux, France, December 12-15, 2006, Proceedings, pp. 3-19, 2006, Springer, 3-540-49990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Leader oracle, Participating process, Consensus, Asynchronous system, Shared object, Atomic register, Set agreement, Asynchronous algorithm, Wait-free algorithm |
41 | Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku |
ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 104-117, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
tripartite, multilinear forms, authentication, key agreement protocol, ID-based |
41 | Noel McCullagh, Paulo S. L. M. Barreto |
A New Two-Party Identity-Based Authenticated Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 262-274, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement |
41 | Xun Yi |
Identity-Based Fault-Tolerant Conference Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(3), pp. 170-178, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Computer network conference, conference key agreement, semitrusted, passive and active attacks, fault tolerance |
41 | Shu-Chin Wang, Kuo-Qin Yan, Chien-Fu Cheng |
Reaching agreement on an unknown network with partial graphic information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(4), pp. 70-89, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
dual failure mode, unknown network, fault tolerance, distributed system, Byzantine Agreement |
41 | Hyung-Min Park, Ho-Won Jung |
Evaluating Interrater Agreement with Intraclass Correlation Coefficient in SPICE-based Software Process Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: 3rd International Conference on Quality Software (QSIC 2003), 6-7 November 2003, Dallas, TX, USA, pp. 308-314, 2003, IEEE Computer Society, 0-7695-2015-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Interrater agreement, SPICE, ISO/IEC 15504 |
41 | Shu-Chin Wang, Kuo-Qin Yan, Mao-Lun Chiang |
Reach Reliable Decision by Using Secret Agreement Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 9th International Conference on Parallel and Distributed Systems, ICPADS 2002, Taiwan, ROC, December 17-20, 2002, pp. 233-238, 2002, IEEE Computer Society, 0-7695-1760-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Net-Meeting, Security, Distributed System, Decision Making, Byzantine Agreement |
41 | Achour Mostéfaoui, Michel Raynal |
Randomized k-set agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: Proceedings of the Thirteenth Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA 2001, Heraklion, Crete Island, Greece, July 4-6, 2001, pp. 291-297, 2001, ACM, 1-58113-409-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fault-tolerance, consensus, asynchronous system, randomized protocol, k-set Agreement |
41 | Shu-Chin Wang, Kuo-Qin Yan |
Reaching Fault Diagnosis Agreement on Dual Link Failure Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: Seventh International Conference on Parallel and Distributed Systems, ICPADS 2000, Iwate, Japan, July 4-7, 2000, pp. 291-298, 2000, IEEE Computer Society, 0-7695-0568-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Distributed System, Parallel Processing, Fault Diagnosis, Byzantine Agreement, Interactive Consistency |
41 | Bernd Altmann, Matthias Fitzi, Ueli M. Maurer |
Byzantine Agreement Secure against General Adversaries in the Dual Failure Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings, pp. 123-137, 1999, Springer, 3-540-66531-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
active adversary, fail-corruption, Broadcast, Byzantine agreement, unconditional security |
41 | Chih-Hung Li, Josef Pieprzyk |
Conference Key Agreement from Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 64-76, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols |
41 | Matthias Fitzi, Ueli M. Maurer |
Efficient Byzantine Agreement Secure Against General Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 12th International Symposium, DISC '98, Andros, Greece, September 24-26, 1998, Proceedings, pp. 134-148, 1998, Springer, 3-540-65066-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
general adversary, Broadcast, fault detection, Byzantine agreement, multi- party computation |
41 | Mike Just, Serge Vaudenay |
Authenticated Multi-Party Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 36-49, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
confirmation, authentication, key agreement, forward secrecy |
41 | Roger M. Kieckhafer, Mohammad H. Azadmanesh |
Reaching Approximate Agreement with Mixed-Mode Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 5(1), pp. 53-63, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
mixed-modefaults, approximate agreement, convergent votingalgorithm, worst-case Byzantine behavior, voting algorithms, reliability, fault tolerant computing, distributed processing, synchronisation, fault-tolerant distributed system |
41 | Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa 0001 |
Checkpointing in a Distributed Coordination Protocol for Multiple Peer Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain, pp. 48-54, 2008, IEEE Computer Society, 978-0-7695-3109-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Martin Biely, Peter Robinson 0002, Ulrich Schmid 0001 |
Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings, pp. 285-299, 2009, Springer, 978-3-642-10876-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Gang Yao, Hongji Wang, Qingshan Jiang |
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 538-543, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Achour Mostéfaoui, Michel Raynal, Corentin Travers |
Narrowing Power vs. Efficiency in Synchronous Set Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008., pp. 99-111, 2008, Springer, 978-3-540-77443-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa 0001 |
A Backward Algorithm in a Distributed Agreement Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 263-270, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Shafi Goldwasser, Yehuda Lindell |
Secure Multi-Party Computation without Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 18(3), pp. 247-287, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Broadcast, Secure multi-party computation, Protocol composition |
40 | Muxiang Zhang |
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 166-183, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Achour Mostéfaoui, Sergio Rajsbaum, Michel Raynal, Matthieu Roy |
Condition-Based Protocols for Set Agreement Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 16th International Conference, DISC 2002, Toulouse, France, October 28-30, 2002 Proceedings, pp. 48-62, 2002, Springer, 3-540-00073-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Khaled El Emam, Jean-Martin Simon, Sonia Rousseau, Eric Jacquet |
Cost Implications of Interrater Agreement for Software Process Assessments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 5th IEEE International Software Metrics Symposium (METRICS 1998), March 20-21, 1998, Bethesda, Maryland, USA, pp. 38-51, 1998, IEEE Computer Society, 0-8186-9201-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
40 | Maurice Herlihy, Sergio Rajsbaum |
A Wait-Free Classification of Loop Agreement Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 12th International Symposium, DISC '98, Andros, Greece, September 24-26, 1998, Proceedings, pp. 175-185, 1998, Springer, 3-540-65066-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
40 | Arkady Zamsky, Amos Israeli, Shlomit S. Pinter |
Optimal Time Byzantine Agreement for t ![Search on Bibsonomy](Pics/bibsonomy.png) |
WDAG ![In: Distributed Algorithms, 6th International Workshop, WDAG '92, Haifa, Israel, November 2-4, 1992, Proceedings, pp. 136-152, 1992, Springer, 3-540-56188-9. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
38 | Carlos Müller, Antonio Ruiz Cortés, Manuel Resinas |
An Initial Approach to Explaining SLA Inconsistencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2008, 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings, pp. 394-406, 2008, 978-3-540-89647-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Quality of Service, Debugging, Service Level Agreement, Consistency Checking, WS-Agreement |
37 | Nicole Oldham, Kunal Verma, Amit P. Sheth, Farshad Hakimpour |
Semantic WS-agreement partner selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 697-706, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ARL, WSDL-S, agreement matching, dynamic service selection, multi-ontology service annotation, semantic policy matching, snobase, ontologies, OWL, semantic web service, WS-agreement |
37 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 205-220, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
37 | Eiji Okamoto, Takeshi Okamoto |
Cryptosystems Based on Elliptic Curve Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, Second International Conference, MDAI 2005, Tsukuba, Japan, July 25-27, 2005, Proceedings, pp. 13-23, 2005, Springer, 3-540-27871-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key agreement scheme, privacy, pairing, ID based cryptosystem |
37 | Elizabeth Borowsky, Eli Gafni, Nancy A. Lynch, Sergio Rajsbaum |
The BG distributed simulation algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 14(3), pp. 127-146, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Simulation, Fault-tolerance, Distributed computing, Consensus, Set-agreement |
36 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 6th International Conference, UIC 2009, Brisbane, Australia, July 7-9, 2009. Proceedings, pp. 310-324, 2009, Springer, 978-3-642-02829-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Master key forward secrecy, Provable security, Weil pairing, Authenticated key agreement |
36 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 203-220, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
36 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 233-247, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
36 | Qiang Tang 0001, Kim-Kwang Raymond Choo |
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 162-177, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
provable security, key agreement, P2P network, CAPTCHA |
36 | Rachid Guerraoui, Maurice Herlihy, Bastian Pochon |
A Topological Treatment of Early-Deciding Set-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 10th International Conference, OPODIS 2006, Bordeaux, France, December 12-15, 2006, Proceedings, pp. 20-35, 2006, Springer, 3-540-49990-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
early global decision, lower bound, topology, time complexity, Set-agreement |
36 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Popescu's Authenticated Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 276-283, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Cryptanalysis, Elliptic curve cryptosystems, Key agreement |
36 | Junghyun Nam, Seungjoo Kim, Dongho Won |
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 1-9, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Group key agreement, collusion attack, key authentication |
36 | Taekyoung Kwon 0002 |
Authenticated Key Agreement Without Subgroup Element Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 577-583, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Small Subgroup Attacks, Authentication, Cryptographic Protocols, Authenticated Key Agreement |
36 | Sangjin Kim, Hoonjung Lee, Heekuck Oh |
Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 323-335, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multiple PKG environment, key agreement protocol, ID-based cryptosystem |
36 | Kennet Henningsson, Claes Wohlin |
Assuring Fault Classification Agreement -- An Empirical Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISESE ![In: 2004 International Symposium on Empirical Software Engineering (ISESE 2004), 19-20 August 2004, Redondo Beach, CA, USA, pp. 95-104, 2004, IEEE Computer Society, 0-7695-2165-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
classifier agreement, Serial studies, empirical evaluation, Fault classification, orthogonal defect classification |
36 | Roy Friedman, Achour Mostéfaoui, Michel Raynal |
The Notion of Veto Number for Distributed Agreement Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2004, 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings, pp. 315-325, 2004, Springer, 3-540-24076-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
One shot problem, Distributed algorithm, Consensus, Asynchronous system, Failure detector, Process crash, Agreement problem |
36 | Frank Niedermeyer, Werner Schindler |
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 133-145, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
unconditional security, Key agreement protocol, CHIMERA |
36 | Mohammad H. Azadmanesh, Roger M. Kieckhafer |
Exploiting Omissive Faults in Synchronous Approximate Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 49(10), pp. 1031-1042, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Approximate agreement, convergent voting algorithms, hybrid faults, clock synchronization, fault-tolerant distributed systems |
36 | Luís Brito, José Neves 0001 |
Agreement and Coalition Formation in Multiagent-Based Virtual Marketplaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Intelligent Problem Solving, Methodologies and Approaches, 13th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2000, New Orleans, Louisiana, USA, June 19-22, 2000, Proceedings, pp. 14-23, 2000, Springer, 3-540-67689-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Virtual Marketplaces, Multiagent Systems, Intelligent Agents, Agreement, Coalition |
36 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 405-419, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |
36 | Stefan Dziembowski, Ueli M. Maurer |
On Generating the Initial Key in the Bounded-Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 126-137, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Thomas Holenstein |
Key agreement from weak bit agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 664-673, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
hard-core sets, cryptography, key agreement |
35 | Cédric Dégremont, Olivier Roy |
Agreement Theorems in Dynamic-Epistemic Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LORI ![In: Logic, Rationality, and Interaction, Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings, pp. 105-118, 2009, Springer, 978-3-642-04892-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | François Bonnet 0001, Michel Raynal |
Looking for the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems: Is ${\it \Pi}_k${\it \Pi}_k the End of the Road? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 149-164, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 8179 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|