The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
57Sriram Rao, Lorenzo Alvisi, Harrick M. Vin The Cost of Recovery in Message Logging Protocols. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF log-based rollback recovery, pessimistic protocols, causal protocols, fault tolerance, Distributed computing, optimistic protocols, hybrid protocols
55Paul J. Fortier, John C. Sieg Jr. Simulation analysis of early commit concurrency control protocols. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF simulation analysis, early commit concurrency control protocols, concurrency control enforcement, atomic data sets, transaction writer, conventional locking, recovery protocols, merged-commit, databases, protocols, virtual machines, concurrency control, database management systems, transaction processing, database design, system recovery, simulation model, replay, optimistic protocols, protocols performance, timestamp ordering
52Carlisle Adams, Steve Lloyd Profiles and protocols for the Internet Public-Key Infrastructure. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Internet Public-Key Infrastructure, X.509 authentication framework, IETF PKIX working group, CRL profile, operational protocols, certificate management protocols, certificate policy, time stamp protocols, notrary protocols, Internet, protocols, standardization, certification, X.509 certificate
50Indranil Gupta On the design of distributed protocols from differential equations. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF endemic protocols, probabilistic protocols, science of protocol design, reliability, scalability, distributed protocols
49Yu-Kwong Kwok, Vincent K. N. Lau A Performance Study of Multiple Access Control Protocols for Wireless Multimedia Services. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF integrated voice/data communication, packet reservation multiple access, multiple access control protocols, wireless multimedia services, broadband wireless multimedia network, user traffic requirements, channel bandwidth allocation, TDMA-based MAC protocols, integrated wireless data/voice services, SCAMA, DTDMA/VR, DTDMA/PR, D4RUMA, DPRMA, DSA++, PRMA/DA, orthogonal design, quality of service, quality of service, performance, asynchronous transfer mode, multimedia communication, time division multiple access, MAC protocol, telecommunication traffic, access protocols, protocol designs, CBR, VBR, broadband networks, packet radio networks, ABR, wireless ATM network
48Alain Raynaud, Zheng Zhang 0001, Josep Torrellas Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors. Search on Bibsonomy HPCA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF update protocols, cache coherence protocols, scalable shared-memory multiprocessors
45Phan Minh Dung, Phan Minh Thang Stepwise development of security protocols: a speech act-oriented approach. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security protocols, cryptographic protocols
45Kamil Kulesza, Zbigniew Kotulski Addressing New Challenges by Building Security Protocols Around Graphs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF extended capabilities, graph theory, quantum computing, security protocols, secret sharing, data security, graph colouring
43Gurdip Singh Constraint-based Structuring of Network Protocols. Search on Bibsonomy Distributed Comput. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Multifunction protocols, Safety and liveness properties, Distributed protocols, Protocol composition
43Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
43Michael Hitchens, Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos
43Efstratios Thomopoulos, Louise E. Moser, P. M. Melliar-Smith Analyzing the latency of the Totem multicast protocols. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Totem multicast protocols, multicast group communication protocols, latency analysis, reliable totally ordered delivery, logical token-passing ring, single-ring network, two-ring network, four-ring network, multiple-ring networks, mean latency, latency distribution, distributed systems, protocols, local area networks, LAN, probability density functions, gateways, protocols performance, message delivery, message filtering
42Liqun Chen 0002, Hoon Wei Lim, Wenbo Mao User-Friendly Grid Security Architecture and Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security
42David C. Roberts, David A. Grossman, Ophir Frieder, Robert Bernstein, Eric Bisfiop Performance testing of communication protocols for three-tier computing: results for ICA and X window protocols. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF three-tier computing, ICA protocols, X window protocols, Windows NT operating system, data server, stored databases, Tier 1, Tier 2, client program, desktop machines, Tier 3, intelligence computer architecture, Microsoft Office 97, Lotus Notes applications, user interface, data compression, data compression, communication protocols, network traffic, application server, performance testing, network bandwidth, multi-user environment
42Shu Chen, Yingying Chen 0001, Wade Trappe Exploiting environmental properties for wireless localization. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Tim Miller 0001, Peter McBurney On illegal composition of first-class agent interaction protocols. Search on Bibsonomy ACSC The full citation details ... 2008 DBLP  BibTeX  RDF multi-agent systems, interaction protocols
41Supakorn Kungpisdan, Yongyuth Permpoontanalarp Practical Reasoning about Accountability in Electronic Commerce Protocols. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Formal methods for security protocols, analysis of electronic commerce protocols
41Norman C. Hutchinson, Larry L. Peterson The x-Kernel: An Architecture for Implementing Network Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF x-Kernel, architecture, protocols, interface, network protocols, network operating systems, operating system kernel
40Birgit Pfitzmann Federated Identity-Management Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Dongyao Ji, Yuming Wang Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38LihChyun Shu, Michal Young Chopping and versioning real-time transactions to avoid remote blocking. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF real time transaction versioning, remote blocking, versioning protocols, chopping analysis, pure locking protocols, 1-version serializability, design time information, simple data structures, small bounded overheads, worst case access times, scheduling, real-time systems, protocols, concurrency control, multiprocessors, multiprocessing systems, transaction processing, configuration management, schedulability analysis, hard real time systems, critical sections, locking protocols, database concurrency control
38Ashok U. Mallya, Munindar P. Singh An algebra for commitment protocols. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multiagent system modelling and design, Formal methods, Commitments, Interaction Protocols
38Indranil Gupta, Mahvesh Nagda, Christo Frank Devaraj The design of novel distributed protocols from differential equations. Search on Bibsonomy Distributed Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Science of protocol design, Endemics, LV, Probabilistic protocols, Reliability, Scalability, Replication, Voting, Differential equations, Distributed protocols
38Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin Verifying The Correctness Of Cryptographic Protocols Using "Convince". Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support
38Daniel A. Menascé, Yelena Yesha, Konstantinos Kalpakis On a Unified Framework for the Evaluation of Distributed Quorum Attainment Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF distributed quorum attainment protocols, unified analytical model, Majority Consensus algorithms, primary site approach, parallel version, tree-based mutual exclusion protocols, fault tolerance, performability, distributed systems, performance analysis, protocols, distributed algorithms, software performance evaluation, software fault tolerance, performability metric, network delay, unified framework, protocol performance, delay analysis, mutual exclusion algorithms
38Simon N. Foley, Hongbin Zhou Towards a Framework for Autonomic Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Simon N. Foley Towards a Framework for Autonomic Security Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Alec Yasinsac, James A. Davis Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Lorenzo Alvisi, Keith Marzullo Message Logging: Pessimistic, Optimistic, Causal, and Optimal. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF pessimistic protocols, checkpoint-restart protocols, resilient processes, specification of fault-tolerance techniques, Message logging, optimistic protocols
36Xin Yuan 0001, Rami G. Melhem, Rajiv Gupta 0001 Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks. Search on Bibsonomy HPCA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF distributed path reservation algorithms, multiplexed all-optical interconnection networks, distributed path reservation protocols, forward reservation protocols, backward reservation protocols, 2-dimensional torus interconnection networks, wavelength division multiplexing, communication delay, time division multiplexing, time division multiplexing
36Huafei Zhu Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols
36Volker Roth 0002 On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF breaking security protocols, cryptanalysis, mobile agent security
36Lansing Sloan Mechanisms that Enforce Bounds on Packet Lifetimes Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF internetwork gateways, maximum packet lifetime, network-layer protocols, three-way handshake, timer-based protocols, transit-time protocols, transport protocols, packet switching, link-layer protocols, subnetworks
35Ching-Hua Chow, Simon S. Lam PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF communication protocols verification, PROSPEC, interactive programming environment, fair reachability analysis, multiphase construction, protocol projection, BSC, X.21, X.25, Telnet document transfer protocols, protocols, specification, software tools, programming environments, graphical interface, interactive programming
35Brian Neil Levine, J. J. Garcia-Luna-Aceves A Comparison of Known Classes of Reliable Multicast Protocols. Search on Bibsonomy ICNP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
35John Spinelli Self-stabilizing sliding window ARQ protocols. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ARQ protocols, computer network protocols, self-stabilizing protocols, protocols
35Mostafa A. Bassiouni Single-Site and Distributed Optimistic Protocols for Concurrency Control. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF single site protocols, single site networks, lock maintenance, deadlock handling, protocols, distributed databases, distributed databases, concurrency control, computer networks, database management system, system recovery, distributed networks, distributed protocols, time-stamps, performance enhancement, optimistic protocols, synchronization methods
35Azzedine Boukerche, Khalil El-Khatib, Tingxue Huang A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wireless networks, mutual exclusion, dynamic channel allocation
35Birgit Pfitzmann, Michael Waidner Federated Identity-Management Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Roger M. Needham Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Peter Landrock Interactive Identification Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Peter Landrock A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Fred Kuhns, Carlos O'Ryan, Douglas C. Schmidt, Ossama Othman, Jeff Parsons The Design and Performance of a Pluggable Protocols Framework for CORBA Middleware. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 1999 DBLP  BibTeX  RDF
34Murray W. Goldberg, Gerald W. Neufeld, Mabo Robert Ito A Parallel Approach to OSI Connection-Oriented Protocols. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 1992 DBLP  BibTeX  RDF
34Beng-Hong Lim, Anant Agarwal Reactive Synchronization Algorithms for Multiprocessors. Search on Bibsonomy ASPLOS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
34Steven Y. Ko, Indranil Gupta, Yookyung Jo A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF autonomic computing and communication, bio-inspired techniques, probabilistic protocols, sequence equations, sequence protocols, adaptivity, grid computing, convergence, design methodology, distributed protocols, Complex adaptive systems, difference equations
34Chih-Hung Li, Josef Pieprzyk Conference Key Agreement from Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols
34Ashok U. Mallya, Munindar P. Singh A Semantic Approach for Designing Commitment Protocols. Search on Bibsonomy AC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34E. Allen Emerson, Vineet Kahlon Exact and Efficient Verification of Parameterized Cache Coherence Protocols. Search on Bibsonomy CHARME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Constantine Coutras, Peng-Jun Wan, Ophir Frieder Analytical Modeling and Performance Evaluation of the HIPERLAN CAC Layer Protocol for Real-Time Traffic. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF HIPERLAN CAC layer protocol, wireless LAN protocols, WLAN protocols, MAC layer protocols, radio equipment, radio systems, European Telecommunications Standards Institute, high performance radio LAN, channel access control layer, simulation, performance evaluation, performance evaluation, real-time systems, wireless networks, wireless LAN, medium access control, analytical modeling, telecommunication traffic, personal computers, access protocols, wireless systems, telecommunication congestion control, telecommunication standards, real-time traffic, packet radio networks, land mobile radio
33Deger Cenk Erdil, Michael J. Lewis Gossiping protocols for hybrid grid resource scheduling. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grid resource scheduling, Epidemic gossiping, Pairwise gossiping, Information dissemination, Gossiping protocols
33Rajashekar Kailar Accountability in Electronic Commerce Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF electronic commerce, logic, cryptographic protocols, Accountability, formal analysis, protocol analysis
33Colin Boyd, Wenbo Mao Designing Secure Key Exchange Protocols. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF authentication, key management, Cryptographic protocols
33Kurt Rothermel, Stefan Pappe Open Commit Protocols Tolerating Commission Failures. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF open systems, commit protocols
33Bruce Christianson, Michael Roe, David Wheeler Secure Sessions from Weak Secrets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano Making Sense of Specifications: The Formalization of SET. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dimitrios D. Vergados Energy-efficient routing protocols in wireless sensor networks for health communication systems. Search on Bibsonomy PETRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF flat networks protocols, wireless sensor networks, routing protocols, sensor nodes
33Stephen Keung, Kai-Yeung Siu Efficient protocols secure against guessing and replay attacks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks
33Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey. Search on Bibsonomy MACE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF aggregation protocols, Peer-to-Peer decentralized monitoring, tree-based protocols, gossip-based protocols
33Andrew A. Hanish, Tharam S. Dillon Object-oriented modelling of communication protocols for re-use. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF industrial implementations, reuseable software modules, reuseable model elements, message sequence encoding, protocol entities, ISO/OSI Reference Model, generalised model, interlayer communication model, modified TTCN notation, Petri nets, protocols, communication protocols, networking protocols, object-oriented modelling, formal descriptions, protocol implementation, alternating bit protocol
33Mike Bond The Dining Freemasons (Security Protocols for Secret Societies). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Richard Clayton Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Mike Bond, George Danezis The Dining Freemasons (Security Protocols for Secret Societies). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33N. Asokan Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Colin Boyd, Wenbo Mao, Kenneth G. Paterson Deniable Authenticated Key Establishment for Internet Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson Is the Verification Problem for Cryptographic Protocols Solved?. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Brian Monahan From Security Protocols to Systems Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Geraint Price Client v. Server Side Protocols, Interfaces and Storage (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati Towards Flexible Credential Negotiation Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Chris Blondia, Olga Casals, Peter De Cleyn, Gert Willems Performance Analysis of IP Micro-mobility Handoff Protocols. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Amos Beimel, Yoav Stahl Robust Information-Theoretic Private Information Retrieval. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Alper Kanak, Öznur Özkasap Transport Protocol Mechanisms for Wireless Networking: A Review and Comparative Simulation Study. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF wireless transport protocols, split-connection protocols, wired-cum-wireless, TCP, end-to-end protocols
31Dieter Gollmann What do We Mean by Entity Authentication? Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication
31Matthias Krause 0001, Dirk Stegemann More on the Security of Linear RFID Authentication Protocols. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography
31Tim Miller 0001, Peter McBurney Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols. Search on Bibsonomy ESAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Fernando Pedone Boosting System Performance with Optimistic Distributed Protocols. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Tim Miller 0001, Peter McBurney Annotation and Matching of First-Class Agent Interaction Protocols. Search on Bibsonomy ArgMAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF first-class protocols, multi-agent systems, annotation, matching, agent interaction
31Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Peer-to-peer (P2P) systems, mutual anonymity, overlay networks, communication protocols, Internet systems
31Sajal K. Das 0001 Coping with uncertainty in wireless mobile networks: an information theoretic framework. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Hassen Saïdi, Victoria Stavridou, Bruno Dutertre Protocol Codesign. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Jari Arkko, Pekka Nikander Limitations of IPsec Policy Mechanisms. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Victoria Stavridou Protocol Codesign (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Teunis J. Ott Transport Protocols in the TCP Paradigm and their Performance. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF performance of transport protocols, Internet, performance, TCP, transport protocols, protocol analysis
31Lívia M. R. Sampaio, Francisco Vilar Brasileiro, André L. C. Moreira Performance Analysis of Adaptive Consensus Protocols Based on Slowness Oracles. Search on Bibsonomy ICDCS Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF adaptive distributed protocols, slowness oracles, asynchronous distributed systems, unreliable failure detectors, consensus protocols
31Olivier Markowitch, Dieter Gollmann, Steve Kremer On Fairness in Exchange Protocols. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF exchange protocols, fairness, security protocols, fair exchange, security properties
31W. Timothy Strayer A Class-Chest for Deriving Transport Protocols. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF class-chest, protocol algorithms, prebuilt infrastructure, Meta-Transport Library, C++ base classes library, Unix environment, rapid prototyping, transport protocols, transport protocols, protocol implementations
31Li Gong Optimal authentication protocols resistant to password guessing attacks. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks
31David W. Pritty, Duncan N. Smeed, Norman L. Lawrie A new class of high speed LAN access protocols based on the principle of timed packet release. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF timed packet release, high speed local area network, bus structures, TPR, performance evaluation, performance, discrete event simulation, discrete event simulation, local area networks, access protocols, access protocols, comparative evaluation, high speed LAN
31Bruno Ciciani, Daniel M. Dias, Philip S. Yu Analysis of Concurrency-Coherency Control Protocols for Distributed Transaction Processing Systems with Regional Locality. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF concurrency-coherency control protocols, distributed transaction processing systems, fully replicated databases, duplicate copies, approximate analytic model, performance evaluation, performance, databases, protocols, delay, distributed processing, distributed databases, concurrency control, transaction processing
31Naftaly H. Minsky The Imposition of Protocols Over Open Distributed Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF enforced specification, online distributed updating, global law, protocols, protocols, distributed processing, open distributed systems
31Ricardo Bianchini, Leonidas I. Kontothanassis Algorithms for categorizing multiprocessor communication under invalidate and update-based coherence protocols. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF shared-memory multiprocessor communication, invalidate-based cache coherence protocols, update-based cache coherence protocols, reference patterns, sharing patterns, useless data traffic, data traffic categorization, parallel programming, parallel programs, virtual machines, transaction processing, shared memory systems, coherence, cache storage, telecommunication traffic, cache misses, simulation algorithms, update transactions, memory protocols
31Deepinder P. Sidhu, Juan Aristizabal Constructing Submodule Specifications and Network Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF submodule specifications, module specification, formal specification, formal specification, protocols, software tools, finite-state machine, communication protocols, network protocols, finite automata, automated tool, execution sequences
30João L. Sobrinho Network routing with path vector protocols: theory and applications. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF path vector protocols, BGP, border gateway protocol, algebra
30Ford-Long Wong Multi-channel Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Richard Clayton 0001 Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Ford-Long Wong, Frank Stajano Multi-channel Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Virgil D. Gligor On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Hoon Wei Lim User-Friendly Grid Security Architecture and Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Yvo Desmedt Understanding Why Some Network Protocols Are User-Unfriendly. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 34979 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license