|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
57 | Sriram Rao, Lorenzo Alvisi, Harrick M. Vin |
The Cost of Recovery in Message Logging Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 12(2), pp. 160-173, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
log-based rollback recovery, pessimistic protocols, causal protocols, fault tolerance, Distributed computing, optimistic protocols, hybrid protocols |
55 | Paul J. Fortier, John C. Sieg Jr. |
Simulation analysis of early commit concurrency control protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 28st Annual Simulation Symposium (SS '95), April 25-28, 1995, Santa Barbara, California, USA, pp. 322-331, 1995, IEEE Computer Society, 0-8186-7091-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
simulation analysis, early commit concurrency control protocols, concurrency control enforcement, atomic data sets, transaction writer, conventional locking, recovery protocols, merged-commit, databases, protocols, virtual machines, concurrency control, database management systems, transaction processing, database design, system recovery, simulation model, replay, optimistic protocols, protocols performance, timestamp ordering |
52 | Carlisle Adams, Steve Lloyd |
Profiles and protocols for the Internet Public-Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 220-224, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Internet Public-Key Infrastructure, X.509 authentication framework, IETF PKIX working group, CRL profile, operational protocols, certificate management protocols, certificate policy, time stamp protocols, notrary protocols, Internet, protocols, standardization, certification, X.509 certificate |
50 | Indranil Gupta |
On the design of distributed protocols from differential equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, PODC 2004, St. John's, Newfoundland, Canada, July 25-28, 2004, pp. 216-225, 2004, ACM, 1-58113-802-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
endemic protocols, probabilistic protocols, science of protocol design, reliability, scalability, distributed protocols |
49 | Yu-Kwong Kwok, Vincent K. N. Lau |
A Performance Study of Multiple Access Control Protocols for Wireless Multimedia Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 283-294, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
integrated voice/data communication, packet reservation multiple access, multiple access control protocols, wireless multimedia services, broadband wireless multimedia network, user traffic requirements, channel bandwidth allocation, TDMA-based MAC protocols, integrated wireless data/voice services, SCAMA, DTDMA/VR, DTDMA/PR, D4RUMA, DPRMA, DSA++, PRMA/DA, orthogonal design, quality of service, quality of service, performance, asynchronous transfer mode, multimedia communication, time division multiple access, MAC protocol, telecommunication traffic, access protocols, protocol designs, CBR, VBR, broadband networks, packet radio networks, ABR, wireless ATM network |
48 | Alain Raynaud, Zheng Zhang 0001, Josep Torrellas |
Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: Proceedings of the Second International Symposium on High-Performance Computer Architecture, San Jose, CA, USA, February 3-7, 1996, pp. 323-334, 1996, IEEE Computer Society, 0-8186-7237-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
update protocols, cache coherence protocols, scalable shared-memory multiprocessors |
45 | Phan Minh Dung, Phan Minh Thang |
Stepwise development of security protocols: a speech act-oriented approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 33-44, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security protocols, cryptographic protocols |
45 | Kamil Kulesza, Zbigniew Kotulski |
Addressing New Challenges by Building Security Protocols Around Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 301-306, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
extended capabilities, graph theory, quantum computing, security protocols, secret sharing, data security, graph colouring |
43 | Gurdip Singh |
Constraint-based Structuring of Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 12(1), pp. 1-12, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Multifunction protocols, Safety and liveness properties, Distributed protocols, Protocol composition |
43 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pp. 245-252, 1997, IEEE Computer Society, 0-8186-8141-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
43 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 105-116, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
43 | Efstratios Thomopoulos, Louise E. Moser, P. M. Melliar-Smith |
Analyzing the latency of the Totem multicast protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 42-50, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Totem multicast protocols, multicast group communication protocols, latency analysis, reliable totally ordered delivery, logical token-passing ring, single-ring network, two-ring network, four-ring network, multiple-ring networks, mean latency, latency distribution, distributed systems, protocols, local area networks, LAN, probability density functions, gateways, protocols performance, message delivery, message filtering |
42 | Liqun Chen 0002, Hoon Wei Lim, Wenbo Mao |
User-Friendly Grid Security Architecture and Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 139-156, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security |
42 | David C. Roberts, David A. Grossman, Ophir Frieder, Robert Bernstein, Eric Bisfiop |
Performance testing of communication protocols for three-tier computing: results for ICA and X window protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 450-455, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
three-tier computing, ICA protocols, X window protocols, Windows NT operating system, data server, stored databases, Tier 1, Tier 2, client program, desktop machines, Tier 3, intelligence computer architecture, Microsoft Office 97, Lotus Notes applications, user interface, data compression, data compression, communication protocols, network traffic, application server, performance testing, network bandwidth, multi-user environment |
42 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 49-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 23-25, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Tim Miller 0001, Peter McBurney |
On illegal composition of first-class agent interaction protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSC ![In: Computer Science 2008, Thirty-First Australasian Computer Science Conference (ACSC2008), Wollongong, NSW, Australia, January 22-25, 2008, pp. 127-136, 2008, Australian Computer Society, 978-1-920682-55-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
multi-agent systems, interaction protocols |
41 | Supakorn Kungpisdan, Yongyuth Permpoontanalarp |
Practical Reasoning about Accountability in Electronic Commerce Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 268-284, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Formal methods for security protocols, analysis of electronic commerce protocols |
41 | Norman C. Hutchinson, Larry L. Peterson |
The x-Kernel: An Architecture for Implementing Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(1), pp. 64-76, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
x-Kernel, architecture, protocols, interface, network protocols, network operating systems, operating system kernel |
40 | Birgit Pfitzmann |
Federated Identity-Management Protocols (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 175-177, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Dongyao Ji, Yuming Wang |
Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 35(1), pp. 6-7, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | LihChyun Shu, Michal Young |
Chopping and versioning real-time transactions to avoid remote blocking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 12-14 December 2000, Cheju Island, South Korea, pp. 93-101, 2000, IEEE Computer Society, 0-7695-0930-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
real time transaction versioning, remote blocking, versioning protocols, chopping analysis, pure locking protocols, 1-version serializability, design time information, simple data structures, small bounded overheads, worst case access times, scheduling, real-time systems, protocols, concurrency control, multiprocessors, multiprocessing systems, transaction processing, configuration management, schedulability analysis, hard real time systems, critical sections, locking protocols, database concurrency control |
38 | Ashok U. Mallya, Munindar P. Singh |
An algebra for commitment protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 14(2), pp. 143-163, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multiagent system modelling and design, Formal methods, Commitments, Interaction Protocols |
38 | Indranil Gupta, Mahvesh Nagda, Christo Frank Devaraj |
The design of novel distributed protocols from differential equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 20(2), pp. 95-114, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Science of protocol design, Endemics, LV, Probabilistic protocols, Reliability, Scalability, Replication, Voting, Differential equations, Distributed protocols |
38 | Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
Verifying The Correctness Of Cryptographic Protocols Using "Convince". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 117-128, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support |
38 | Daniel A. Menascé, Yelena Yesha, Konstantinos Kalpakis |
On a Unified Framework for the Evaluation of Distributed Quorum Attainment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 20(11), pp. 868-884, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
distributed quorum attainment protocols, unified analytical model, Majority Consensus algorithms, primary site approach, parallel version, tree-based mutual exclusion protocols, fault tolerance, performability, distributed systems, performance analysis, protocols, distributed algorithms, software performance evaluation, software fault tolerance, performability metric, network delay, unified framework, protocol performance, delay analysis, mutual exclusion algorithms |
38 | Simon N. Foley, Hongbin Zhou |
Towards a Framework for Autonomic Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 49-54, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Simon N. Foley |
Towards a Framework for Autonomic Security Protocols (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 55-62, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Alec Yasinsac, James A. Davis |
Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 189-202, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Lorenzo Alvisi, Keith Marzullo |
Message Logging: Pessimistic, Optimistic, Causal, and Optimal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 24(2), pp. 149-159, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
pessimistic protocols, checkpoint-restart protocols, resilient processes, specification of fault-tolerance techniques, Message logging, optimistic protocols |
36 | Xin Yuan 0001, Rami G. Melhem, Rajiv Gupta 0001 |
Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: Proceedings of the 3rd IEEE Symposium on High-Performance Computer Architecture (HPCA '97), San Antonio, Texas, USA, February 1-5, 1997, pp. 38-47, 1997, IEEE Computer Society, 0-8186-7764-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
distributed path reservation algorithms, multiplexed all-optical interconnection networks, distributed path reservation protocols, forward reservation protocols, backward reservation protocols, 2-dimensional torus interconnection networks, wavelength division multiplexing, communication delay, time division multiplexing, time division multiplexing |
36 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 214-225, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
36 | Volker Roth 0002 |
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Agents ![In: Mobile Agents, 5th International Conference, MA 2001 Atlanta, GA, USA, December 2-4, 2001, Proceedings, pp. 1-14, 2001, Springer, 3-540-42952-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
breaking security protocols, cryptanalysis, mobile agent security |
36 | Lansing Sloan |
Mechanisms that Enforce Bounds on Packet Lifetimes ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 1(4), pp. 311-330, 1983. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
internetwork gateways, maximum packet lifetime, network-layer protocols, three-way handshake, timer-based protocols, transit-time protocols, transport protocols, packet switching, link-layer protocols, subnetworks |
35 | Ching-Hua Chow, Simon S. Lam |
PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 14(3), pp. 327-338, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
communication protocols verification, PROSPEC, interactive programming environment, fair reachability analysis, multiphase construction, protocol projection, BSC, X.21, X.25, Telnet document transfer protocols, protocols, specification, software tools, programming environments, graphical interface, interactive programming |
35 | Brian Neil Levine, J. J. Garcia-Luna-Aceves |
A Comparison of Known Classes of Reliable Multicast Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 1996 International Conference on Network Protocols, ICNP 1996, October 29 - November 1, 1996, Columbus, Ohio, USA, pp. 112-, 1996, IEEE Computer Society, 0-8186-7453-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
35 | John Spinelli |
Self-stabilizing sliding window ARQ protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 5(2), pp. 245-254, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
ARQ protocols, computer network protocols, self-stabilizing protocols, protocols |
35 | Mostafa A. Bassiouni |
Single-Site and Distributed Optimistic Protocols for Concurrency Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 14(8), pp. 1071-1080, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
single site protocols, single site networks, lock maintenance, deadlock handling, protocols, distributed databases, distributed databases, concurrency control, computer networks, database management system, system recovery, distributed networks, distributed protocols, time-stamps, performance enhancement, optimistic protocols, synchronization methods |
35 | Azzedine Boukerche, Khalil El-Khatib, Tingxue Huang |
A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 27-34, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
wireless networks, mutual exclusion, dynamic channel allocation |
35 | Birgit Pfitzmann, Michael Waidner |
Federated Identity-Management Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 153-174, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Roger M. Needham |
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 1-4, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Peter Landrock |
Interactive Identification Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 43-48, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Peter Landrock |
A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings, pp. 137-145, 1998, Springer, 3-540-65663-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Fred Kuhns, Carlos O'Ryan, Douglas C. Schmidt, Ossama Othman, Jeff Parsons |
The Design and Performance of a Pluggable Protocols Framework for CORBA Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols for High-Speed Networks ![In: Protocols for High Speed Networks VI, IFIP TC6 WG6.1 & WG6.4 / IEEE ComSoc TC on Gigabit Networking Sixth International Workshop on Protocols for High Speed Networks (PfHSN '99), August 25-27, 1999, Salem, Massachusetts, USA, pp. 81-98, 1999, Kluwer, 0-7923-8690-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
34 | Murray W. Goldberg, Gerald W. Neufeld, Mabo Robert Ito |
A Parallel Approach to OSI Connection-Oriented Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols for High-Speed Networks ![In: Protocols for High-Speed Networks III, Proceedings of the IFIP WG6.1/WG6.4 Third International Workshop on Protocols for High-Speed Networks, Stockholm, Sweden, 13-15 May, 1992, pp. 219-232, 1992, North-Holland, 0-444-89925-1. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
34 | Beng-Hong Lim, Anant Agarwal |
Reactive Synchronization Algorithms for Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: ASPLOS-VI Proceedings - Sixth International Conference on Architectural Support for Programming Languages and Operating Systems, San Jose, California, USA, October 4-7, 1994., pp. 25-35, 1994, ACM Press, 0-89791-660-3. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
34 | Steven Y. Ko, Indranil Gupta, Yookyung Jo |
A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 3(3), pp. 11:1-11:34, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
autonomic computing and communication, bio-inspired techniques, probabilistic protocols, sequence equations, sequence protocols, adaptivity, grid computing, convergence, design methodology, distributed protocols, Complex adaptive systems, difference equations |
34 | Chih-Hung Li, Josef Pieprzyk |
Conference Key Agreement from Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 64-76, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols |
34 | Ashok U. Mallya, Munindar P. Singh |
A Semantic Approach for Designing Commitment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AC ![In: Agent Communication, International Workshop on Agent Communication, AC 2004, New York, NY, USA, July 19, 2004, Revised Selected and Invited Papers, pp. 33-49, 2004, Springer, 3-540-25015-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | E. Allen Emerson, Vineet Kahlon |
Exact and Efficient Verification of Parameterized Cache Coherence Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHARME ![In: Correct Hardware Design and Verification Methods, 12th IFIP WG 10.5 Advanced Research Working Conference, CHARME 2003, L'Aquila, Italy, October 21-24, 2003, Proceedings, pp. 247-262, 2003, Springer, 3-540-20363-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Constantine Coutras, Peng-Jun Wan, Ophir Frieder |
Analytical Modeling and Performance Evaluation of the HIPERLAN CAC Layer Protocol for Real-Time Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 428-436, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
HIPERLAN CAC layer protocol, wireless LAN protocols, WLAN protocols, MAC layer protocols, radio equipment, radio systems, European Telecommunications Standards Institute, high performance radio LAN, channel access control layer, simulation, performance evaluation, performance evaluation, real-time systems, wireless networks, wireless LAN, medium access control, analytical modeling, telecommunication traffic, personal computers, access protocols, wireless systems, telecommunication congestion control, telecommunication standards, real-time traffic, packet radio networks, land mobile radio |
33 | Deger Cenk Erdil, Michael J. Lewis |
Gossiping protocols for hybrid grid resource scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 2(4), pp. 298-310, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Grid resource scheduling, Epidemic gossiping, Pairwise gossiping, Information dissemination, Gossiping protocols |
33 | Rajashekar Kailar |
Accountability in Electronic Commerce Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 22(5), pp. 313-328, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
electronic commerce, logic, cryptographic protocols, Accountability, formal analysis, protocol analysis |
33 | Colin Boyd, Wenbo Mao |
Designing Secure Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 93-105, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
authentication, key management, Cryptographic protocols |
33 | Kurt Rothermel, Stefan Pappe |
Open Commit Protocols Tolerating Commission Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 18(2), pp. 289-332, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
open systems, commit protocols |
33 | Bruce Christianson, Michael Roe, David Wheeler |
Secure Sessions from Weak Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 190-205, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano |
Making Sense of Specifications: The Formalization of SET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 74-81, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dimitrios D. Vergados |
Energy-efficient routing protocols in wireless sensor networks for health communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
flat networks protocols, wireless sensor networks, routing protocols, sensor nodes |
33 | Stephen Keung, Kai-Yeung Siu |
Efficient protocols secure against guessing and replay attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 105, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks |
33 | Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti |
Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACE ![In: Modelling Autonomic Communications Environments, Fourth IEEE International Workshop, MACE 2009, Venice, Italy, October 26-27, 2009. Proceedings, pp. 111-116, 2009, Springer, 978-3-642-05005-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
aggregation protocols, Peer-to-Peer decentralized monitoring, tree-based protocols, gossip-based protocols |
33 | Andrew A. Hanish, Tharam S. Dillon |
Object-oriented modelling of communication protocols for re-use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 18, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
industrial implementations, reuseable software modules, reuseable model elements, message sequence encoding, protocol entities, ISO/OSI Reference Model, generalised model, interlayer communication model, modified TTCN notation, Petri nets, protocols, communication protocols, networking protocols, object-oriented modelling, formal descriptions, protocol implementation, alternating bit protocol |
33 | Mike Bond |
The Dining Freemasons (Security Protocols for Secret Societies). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 266-275, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Richard Clayton |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 89-96, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Mike Bond, George Danezis |
The Dining Freemasons (Security Protocols for Secret Societies). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 258-265, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | N. Asokan |
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 42-48, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
Deniable Authenticated Key Establishment for Internet Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 255-271, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson |
Is the Verification Problem for Cryptographic Protocols Solved?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 183-189, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Brian Monahan |
From Security Protocols to Systems Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 307-322, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Geraint Price |
Client v. Server Side Protocols, Interfaces and Storage (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 74-79, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Towards Flexible Credential Negotiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 19-23, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Chris Blondia, Olga Casals, Peter De Cleyn, Gert Willems |
Performance Analysis of IP Micro-mobility Handoff Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols for High-Speed Networks ![In: Protocols for High Speed Networks, 7th IFIP/IEEE International Workshop, PfHSN 2002, Berlin, Germany, April 22-24, 2002, Proceedings, pp. 211-226, 2002, Springer, 3-540-43658-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Amos Beimel, Yoav Stahl |
Robust Information-Theoretic Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 326-341, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Alper Kanak, Öznur Özkasap |
Transport Protocol Mechanisms for Wireless Networking: A Review and Comparative Simulation Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 852-859, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
wireless transport protocols, split-connection protocols, wired-cum-wireless, TCP, end-to-end protocols |
31 | Dieter Gollmann |
What do We Mean by Entity Authentication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 46-54, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication |
31 | Matthias Krause 0001, Dirk Stegemann |
More on the Security of Linear RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 182-196, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography |
31 | Tim Miller 0001, Peter McBurney |
Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAW ![In: Engineering Societies in the Agents World VII, 7th International Workshop, ESAW 2006, Dublin, Ireland, September 6-8, 2006 Revised Selected and Invited Papers, pp. 245-264, 2006, Springer, 978-3-540-75522-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Fernando Pedone |
Boosting System Performance with Optimistic Distributed Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(12), pp. 80-86, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Tim Miller 0001, Peter McBurney |
Annotation and Matching of First-Class Agent Interaction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ArgMAS ![In: Argumentation in Multi-Agent Systems, Fifth International Workshop, ArgMAS 2008, Estoril, Portugal, May 12, 2008. Revised Selected and Invited Papers, pp. 141-158, 2008, Springer, 978-3-642-00206-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
first-class protocols, multi-agent systems, annotation, matching, agent interaction |
31 | Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 |
Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 829-840, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Peer-to-peer (P2P) systems, mutual anonymity, overlay networks, communication protocols, Internet systems |
31 | Sajal K. Das 0001 |
Coping with uncertainty in wireless mobile networks: an information theoretic framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 1, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Hassen Saïdi, Victoria Stavridou, Bruno Dutertre |
Protocol Codesign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 106-113, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Jari Arkko, Pekka Nikander |
Limitations of IPsec Policy Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 241-251, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Victoria Stavridou |
Protocol Codesign (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 114-118, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Teunis J. Ott |
Transport Protocols in the TCP Paradigm and their Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 30(4), pp. 351-385, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
performance of transport protocols, Internet, performance, TCP, transport protocols, protocol analysis |
31 | Lívia M. R. Sampaio, Francisco Vilar Brasileiro, André L. C. Moreira |
Performance Analysis of Adaptive Consensus Protocols Based on Slowness Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 23-24 March 2004, Hachioji, Tokyo, Japan, pp. 340-346, 2004, IEEE Computer Society, 0-7695-2087-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
adaptive distributed protocols, slowness oracles, asynchronous distributed systems, unreliable failure detectors, consensus protocols |
31 | Olivier Markowitch, Dieter Gollmann, Steve Kremer |
On Fairness in Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 451-464, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
exchange protocols, fairness, security protocols, fair exchange, security properties |
31 | W. Timothy Strayer |
A Class-Chest for Deriving Transport Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 21st Conference on Local Computer Networks, Minneapolis, Minnesota, USA, October 13-16, 1996, pp. 106-115, 1996, IEEE Computer Society, 0-8186-7617-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
class-chest, protocol algorithms, prebuilt infrastructure, Meta-Transport Library, C++ base classes library, Unix environment, rapid prototyping, transport protocols, transport protocols, protocol implementations |
31 | Li Gong |
Optimal authentication protocols resistant to password guessing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 24-29, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks |
31 | David W. Pritty, Duncan N. Smeed, Norman L. Lawrie |
A new class of high speed LAN access protocols based on the principle of timed packet release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 20th Conference on Local Computer Networks (LCN'95), Minneapolis, Minnesota, USA, October 16-19, 1995, pp. 443-452, 1995, IEEE Computer Society, 0-8186-7162-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
timed packet release, high speed local area network, bus structures, TPR, performance evaluation, performance, discrete event simulation, discrete event simulation, local area networks, access protocols, access protocols, comparative evaluation, high speed LAN |
31 | Bruno Ciciani, Daniel M. Dias, Philip S. Yu |
Analysis of Concurrency-Coherency Control Protocols for Distributed Transaction Processing Systems with Regional Locality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 18(10), pp. 899-914, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
concurrency-coherency control protocols, distributed transaction processing systems, fully replicated databases, duplicate copies, approximate analytic model, performance evaluation, performance, databases, protocols, delay, distributed processing, distributed databases, concurrency control, transaction processing |
31 | Naftaly H. Minsky |
The Imposition of Protocols Over Open Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(2), pp. 183-195, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
enforced specification, online distributed updating, global law, protocols, protocols, distributed processing, open distributed systems |
31 | Ricardo Bianchini, Leonidas I. Kontothanassis |
Algorithms for categorizing multiprocessor communication under invalidate and update-based coherence protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 28st Annual Simulation Symposium (SS '95), April 25-28, 1995, Santa Barbara, California, USA, pp. 115-, 1995, IEEE Computer Society, 0-8186-7091-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
shared-memory multiprocessor communication, invalidate-based cache coherence protocols, update-based cache coherence protocols, reference patterns, sharing patterns, useless data traffic, data traffic categorization, parallel programming, parallel programs, virtual machines, transaction processing, shared memory systems, coherence, cache storage, telecommunication traffic, cache misses, simulation algorithms, update transactions, memory protocols |
31 | Deepinder P. Sidhu, Juan Aristizabal |
Constructing Submodule Specifications and Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 14(11), pp. 1565-1577, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
submodule specifications, module specification, formal specification, formal specification, protocols, software tools, finite-state machine, communication protocols, network protocols, finite automata, automated tool, execution sequences |
30 | João L. Sobrinho |
Network routing with path vector protocols: theory and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany, pp. 49-60, 2003, ACM, 1-58113-735-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
path vector protocols, BGP, border gateway protocol, algebra |
30 | Ford-Long Wong |
Multi-channel Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 128-132, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Richard Clayton 0001 |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 82-88, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Ford-Long Wong, Frank Stajano |
Multi-channel Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 112-127, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Virgil D. Gligor |
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 276-283, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Hoon Wei Lim |
User-Friendly Grid Security Architecture and Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 157-161, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Yvo Desmedt |
Understanding Why Some Network Protocols Are User-Unfriendly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 220-227, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 34979 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|