The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Protocol with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1970 (21) 1971 (35) 1972 (19) 1973 (20) 1974 (16) 1975-1976 (39) 1977 (18) 1978 (22) 1979 (23) 1980 (28) 1981 (44) 1982 (88) 1983 (118) 1984 (143) 1985 (130) 1986 (127) 1987 (155) 1988 (208) 1989 (222) 1990 (251) 1991 (312) 1992 (327) 1993 (365) 1994 (375) 1995 (448) 1996 (551) 1997 (616) 1998 (703) 1999 (935) 2000 (1117) 2001 (1265) 2002 (1622) 2003 (2040) 2004 (2750) 2005 (3484) 2006 (3806) 2007 (3999) 2008 (3942) 2009 (3029) 2010 (1931) 2011 (1819) 2012 (1829) 2013 (1898) 2014 (1817) 2015 (1900) 2016 (1767) 2017 (1908) 2018 (1966) 2019 (2065) 2020 (1967) 2021 (2020) 2022 (1949) 2023 (1934) 2024 (379)
Publication types (Num. hits)
article(22825) book(22) data(7) incollection(146) inproceedings(37189) phdthesis(341) proceedings(31) www(1)
Venues (Conferences, Journals, ...)
RFC(2172) CoRR(1649) Wirel. Pers. Commun.(698) ICC(695) IEEE Access(627) IACR Cryptol. ePrint Arch.(593) GLOBECOM(518) Sensors(490) LCN(479) WCNC(442) ISCC(425) Comput. Commun.(422) Wirel. Networks(374) INFOCOM(358) IEEE J. Sel. Areas Commun.(354) PIMRC(336) More (+10 of total 4934)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 31248 occurrences of 6773 keywords

Results
Found 60562 publication records. Showing 60562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Eun-Jun Yoon, Kee-Young Yoo An Efficient Authentication and Key Agreement Protocol in RFID System. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Security protocol, Key agreement, RFID system, Session key
27Nan Zhang, Yuanchun Shi, Bin Chang Impact of Node Cheating on Gossip-Based Protocol. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF node cheating, reliable, gossip-based protocol, ALM
27Il-Sun You, Kyungsan Cho A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mipv6 Binding Update Protocol, CAM-DH, CGA
27Kwangjo Kim, Sangjoon Park, Joonsang Baek Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party
27Lidia Yamamoto, Christian F. Tschudin Experiments on the Automatic Evolution of Protocols Using Genetic Programming. Search on Bibsonomy WAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol evolution, genetic programming, protocol synthesis
27Takuro Kitayama, Akihiko Miyoshi, Tetsuya Saito, Hideyuki Tokuda Real-time communication in distributed environment-real-time packet filter approach. Search on Bibsonomy RTCSA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF real-time packet filter approach, operating system technology, user-level protocol processing, distributed real-time environment, real-time systems, real-time communication, distributed environment, packet filter, protocol processing
27László Bokor, László Tamás Zeke, Szabolcs Nováczki, Gábor Jeney Protocol design and analysis of a HIP-based per-application mobility management platform. Search on Bibsonomy MOBIWAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application-specific handover management, cross-layer protocol design, hipsim++ simulation framework, inet/omnet++, per-application mobility management, performance evaluation and analysis, host identity protocol (hip), protocol simulation
27Jiabin Xie, Adwait Nerlikar, John R. Glover, Bruce A. McKinley An ICU Protocol Development and Management System. Search on Bibsonomy CBMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ICU, clinical decision-making, computerized protocol, protocol development, protocol, standardization, expert system, decision support, automation, knowledge engineering
27Liqun Chen 0002, Steve Kremer, Mark Dermot Ryan (eds.) Formal Protocol Verification Applied, 14.10. - 19.10.2007 Search on Bibsonomy Formal Protocol Verification Applied The full citation details ... 2008 DBLP  BibTeX  RDF
27Cas Cremers Complete Characterization of Security Protocols by Pattern Refinement. Search on Bibsonomy Formal Protocol Verification Applied The full citation details ... 2007 DBLP  BibTeX  RDF
26Dawid Kurzyniec, Tomasz Wrzosek, Vaidy S. Sunderam, Aleksander Slominski Experiments with multi-protocol RMI in Java. Search on Bibsonomy Java Grande The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Java, communication protocols, RMI, RPC
26Mohammad S. Obaidat, Mohammad A. Al-Rousan MTR: A Modified Token Ring Protocol and Its Performance. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
26Hyun-Wook Jin, Junbeom Yoo Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems. Search on Bibsonomy SEUS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network Protocol Stacks, Network Gateway, Formal Verification, Protocol Verification, Embedded Operating Systems, Embedded Networks
26László Bokor, Szabolcs Nováczki, László Tamás Zeke, Gábor Jeney Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++. Search on Bibsonomy MSWiM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF INET, handover performance, real-life hip testbed, C++, OMNeT++, simulation framework, host identity protocol (HIP), protocol simulation
26Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random deal of cards, Secret key exchange, Key set protocol, Transformation protocol, Card games
26Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SEAD, I-SEAD protocol, Ad hoc networks, simulation experiments, secure routing protocol
26Nancy Alonistioti, Eleni Patouni, Vangelis Gazis Generic Architecture and Mechanisms for Protocol Reconfiguration. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF protocol component, reconfiguration, binding, protocol stack
26Julien Bringer, Hervé Chabanne, Emmanuelle Dottax HB++: a Lightweight Authentication Protocol Secure against Some Attacks. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF We here show how a modification of the HB+ protocol thwarts Gilbert et al’s attack, The resulting protocol, HB++, remains a good choice for RFID authentication
26Hongbing Chen, Qun Yang, Manwu Xu A Calculus for MAS Interaction Protocol. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Dialogue protocol, Multi-agent, Interaction protocol, ?-Calculus
26Samir Aknine, Suzanne Pinson, Melvin F. Shakun An Extended Multi-Agent Negotiation Protocol. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multi-agent systems, negotiation protocol, contract net protocol
26Supakorn Kungpisdan, Bala Srinivasan 0002, Phu Dung Le A Secure Account-Based Mobile Payment Protocol. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Electronic commerce protocol, credit-card payment, cryptographic protocol, mobile payment
26Marc Boyer, Mihaela Sighireanu Synthesis and Verification of Constraints in the PGM Protocol. Search on Bibsonomy FME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PGM protocol, real-time multicast protocol, finite and timed model-checking, parameterized verification, constraint synthesis
26Daniel J. Sorin, Manoj Plakal, Anne Condon, Mark D. Hill, Milo M. K. Martin, David A. Wood 0001 Specifying and Verifying a Broadcast and a Multicast Snooping Cache Coherence Protocol. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multicast snooping, Cache coherence, protocol verification, protocol specification, memory consistency
26Jehoshua Bruck, Danny Dolev, Ching-Tien Ho, Rimon Orni, H. Raymond Strong PCODE: an efficient and reliable collective communication protocol for unreliable broadcast domain. Search on Bibsonomy IPPS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF PCODE, unreliable broadcast domain, point-to-point protocol, Silicon Graphics Indigo workstations, broadcast, message passing, programming environments, local area networks, transport protocols, communication protocol, LAN
26P. Venkat Rangan Trust Requirements and Performance of a Fast Subtransprot-Level Protocol for Secure Communication. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF trust requirements, fast subtransport-level protocol, authenticated datagram protocol, host-to-host secure channels, agent-to-agent channels, average latency, performance, protocols, data integrity, Ethernet, security of data, secure communication, Sun workstations, maximum throughput
26Radim Burget, Dan Komosny, Milan Simek Simulation of Large-Scale IPTV Systems for Fixed and Mobile Networks. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RTP Control protocol, Internet Protocol Television, Receiver Summary Packets, Sender reports, Receiver reports, Petri net, Feedback, IPTV, RTP, Real-time Transport Protocol, RTCP, hierarchical aggregation
26Andrew A. Hanish, Tharam S. Dillon Object-oriented modelling of communication protocols for re-use. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF industrial implementations, reuseable software modules, reuseable model elements, message sequence encoding, protocol entities, ISO/OSI Reference Model, generalised model, interlayer communication model, modified TTCN notation, Petri nets, protocols, communication protocols, networking protocols, object-oriented modelling, formal descriptions, protocol implementation, alternating bit protocol
26Bao-Chyuan Jenq, Walter H. Kohler, Donald F. Towsley A Queueing Network Model for a Distributed Database Testbed System. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF distributed database testbed system, transaction workload, transaction recovery protocol, write-ahead logging, centralized two-phase commit, protocols, distributed databases, queueing theory, program testing, system recovery, queueing network model, two-phase locking, commit protocol, distributed deadlock detection, concurrency control protocol
25Giampaolo Bella Lack of Explicitness Strikes Back (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Norizal Abd Latif, Mohd Fadzil Hassan 0001, Mohd Hilmi Hasan Interaction protocol for agent-based e-learning system. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interaction protocol, electronic institution, e-learning system, agent-based
25Phillip G. Bradford, Sunju Park, Michael H. Rothkopf, Heejin Park Protocol completion incentive problems in cryptographic Vickrey auctions. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Vickrey actions, Bidder incentives, Yao’s millionaires’ protocol
25Zhiliang Wang, Xia Yin, Chuanming Jing A formal method to real-time protocol interoperability testing. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF real-time testing, timed input output automata (TIOA), test generation, interoperability testing, protocol testing
25Ryuichi Takahashi, Kenji Tei, Fuyuki Ishikawa, Yoshiaki Fukazawa, Shinichi Honiden A Flexible Protocol Composition for Multi-party Coordination Protocols in Multi-agent Systems. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multi-agent system, metadata, protocol composition
25Guoqiang Shu, Yating Hsu, David Lee 0001 Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fuzz testing, Security Testing, Protocol Synthesis
25João Rodrigues, João Ventura 0001, A. M. de Campos, Luís E. T. Rodrigues Implementation and analysis of real-time communication protocol compositions. Search on Bibsonomy Real Time Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protocol composition and execution framework, Real-time, Schedulability analysis, Allocation, Priority assignment
25Juan Caballero, Heng Yin 0001, Zhenkai Liang, Dawn Xiaodong Song Polyglot: automatic extraction of protocol message format using dynamic binary analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF protocol reverse engineering, binary analysis
25Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag
25Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain
25Changjie Wang, Ho-fung Leung A secure and private clarke tax voting protocol without trusted authorities. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Clarke tax voting protocol, universal verification, security, privacy protection, electronic voting, mix network, ElGamal encryption
25Qiujian Sheng, Zhi-Kun Zhao, Shaohui Liu, Zhongzhi Shi A Teamwork Protocol for Multi-agent System. Search on Bibsonomy PRIMA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF joint intention, ACL (Agent communication language), joint-request, delegation-request, teamwork protocol
25Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn Tapping Alert Protocol. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF promiscuous mode, sniffing, tapping alert protocol, cryptography, network security
25Bogdan S. Chlebus, Dariusz R. Kowalski, Tomasz Radzik Many-to-Many Communication in Radio Networks. Search on Bibsonomy Algorithmica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Many-to-many communication, Centralized protocol, Broadcast, Randomization, Gossiping, Radio network, Distributed protocol
25Jonathan Billington, Somsak Vanit-Anunchai, Guy Edward Gallasch Parameterised Coloured Petri Net Channel Models. Search on Bibsonomy Trans. Petri Nets Other Model. Concurr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Parameterized Protocol Channel Models, Datagram Congestion Control Protocol, Coloured Petri Nets, Reachability Analysis
25Ka Lun Eddie Law, Wing-Chung Hung Channel control for multi-radio multi-channel wireless mesh networks. Search on Bibsonomy PM2HW2N The full citation details ... 2008 DBLP  DOI  BibTeX  RDF connection drops, multi-radio multi-channel medium access control protocol, saturation throughput, two-way multiple-segment MAC protocol, delay, wireless mesh networks, 802.11, wireless local area networks
25W. Timothy Strayer A Class-Chest for Deriving Transport Protocols. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF class-chest, protocol algorithms, prebuilt infrastructure, Meta-Transport Library, C++ base classes library, Unix environment, rapid prototyping, transport protocols, transport protocols, protocol implementations
25Bobby Krupczak, Kenneth L. Calvert, Mostafa H. Ammar Increasing the portability and re-usability of protocol code. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF protocol deployment, protocol subsystem, portability, protocol implementation
24Lin Cai 0001, Xuemin Shen, Jon W. Mark, Jianping Pan 0001 QoS support in Wireless/Wired networks using the TCP-Friendly AIMD protocol. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Aybek Mukhamedov, Mark Dermot Ryan Resolve-Impossibility for a Contract-Signing Protocol. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo Formal analysis of secure contracting protocol for e-tendering. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF e-tendering, secure e-contract, e-commerce security
24Toshihiko Yamakami An application layer protocol interoperability design model for content evolution in the mobile Internet. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24C. Geldrez, Stan Matwin, Johanne Morin, Robert L. Probert An Application of Explanation-Based Learning to Protocol Conformance Testing. Search on Bibsonomy IEEE Expert The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Sandra L. Murphy, A. Udaya Shankar A verified connection management protocol for the transport layer. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
24Srikanta Tirthapura, Maurice Herlihy Self-Stabilizing Distributed Queuing. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF arrow protocol, self-stabilization, Distributed queue
24Daniel Dietterle Embedded system protocol design flow based on SDL: from specification to hardware/software implementation. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protocol accelerator, embedded systems, SDL, protocol engineering, IEEE 802.15.3
24Daniel Popa, Joanna Tomasik On Markov Chain Modelling of Asynchronous Optical CSMA/CA Protocol. Search on Bibsonomy MASCOTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Asynchronous optical CSMA/CA protocol, Variable size packets, MAC protocol performance, Markov model
24Shigeru Watanabe, Kenshu Seto, Yuji Ishikawa, Satoshi Komatsu, Masahiro Fujita Protocol Transducer Synthesis using Divide and Conquer approach. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF out-of-order transactions, large scale system on a chip, IP-based design, automatic protocol transducer synthesis, nonblocking transactions, design methodologies, communication protocols, protocol conversion, divide and conquer approach
24Moon Jeong Kim, Dong Hoon Lee 0001, Young Ik Eom Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF enhanced wireless ad-hoc network, multi-path routing protocol, node/link non-disjoint route, on-demand routing protocol
24N. Sreenath, Balaji Palanisamy An Online Distributed Protocol for the Restoration of Connectivity in the Virtual topology after Link failure in IP over WDM networks. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Reconfiguration of Virtual topology, On-line protocol, Distributed protocol, Link Failures, WDM Optical Network
24Abdelhamid Mellouk, Mustapha Guezouri A new methodology to adapt SIP Protocol for voice traffic transported over IP Network. Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multimedia sessions, TURN and STUN Protocol, Session Initiation Protocol, Voice over IP, Network Address Translation
24Emma Carlson, Martin Kubisch, Daniel Hollos A receiver based protecting protocol for wireless multi-hop networks. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF JamTDMA, receiver protection, protocol, wireless multi-hop networks, reservation protocol
24Sajal K. Das 0001, Enoch Lee, Kalyan Basu, Sanjoy K. Sen Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF H.323 protocol, link-level QoS, radio link protocol (RLP), Wireless network, performance study
24Akhil Kumar 0001 An Efficient SuperGrid Protocol for High Availability and Load Balancing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF grid protocol, Crumbling Walls protocol, Paths system, load balancing, availability, quorum system, Server replication
24Wei Mingliang, Qian Yu, Mao Bing, Xie Li Protocol Mapping Model for Distributed Multimedia Systems. Search on Bibsonomy TOOLS (36) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protocol mapping, protocol binding, active networks, distributed multimedia system
24Alain J. Mayer, Moti Yung Secure Protocol Transformation via "Expansion": From Two-Party to Groups. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy
24Lawrence C. Paulson Mechanized proofs for a recursive authentication protocol. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys
24Jörg Ottensmeyer, Peter Martini Improving the demand-priority protocol. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF demand-priority protocol, IEEE 802.12, low latency service, high-priority traffic, normal priority traffic, high priority traffic, variable bit rate high priority loads, service strategies, standardization, network topology, network topology, simulation results, medium access control protocol, interactive multimedia applications
24Chung-Ming Huang, Jenq-Muh Hsu, Huei-Yang Lai A modified transition tour protocol test method. Search on Bibsonomy J. Syst. Integr. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF protocol testing and formal modeling, Computer networks, protocol engineering
24T. Ramalingom, Krishnaiyan Thulasiraman, Anindya Das A Matroid-Theoretic Solution to an Assignment Problem in the Conformance Testing of Communication Protocols. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF algorithms, communication, Protocol, graph theory, communication protocol, matroids, protocol testing
24J. William Atwood, Y. Zhang A definition of the XTP service and its formal specification. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF XTP service, Xpress Transfer Protocol, transport-level protocol, network-level protocol, unicast environment, multicast environment, specification architecture, data type definitions, process structures, distributed systems, real-time systems, real-time systems, formal specification, formal specification, local area networks, transport protocols, multimedia systems, multimedia systems, open systems, LOTOS
24Madhu Gopinathan, Sriram K. Rajamani Enforcing object protocols by combining static and runtime analysis. Search on Bibsonomy OOPSLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF aspect oriented programming, program verification, invariants
24Kaliappa Nadar Ravindran, Kevin A. Kwiat, Gwangyu Ding Simulation-Based Validation of Protocols for Distributed Systems. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Hong Wang, Jianping Ma, Bo Chen Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Payment protocol, iKP, fairness, strand space
23Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF botnet infiltration, protocol reverse engineering, binary analysis
23Vehbi C. Gungor, Özgür B. Akan, Ian F. Akyildiz A real-time and reliable transport (RT) 2 protocol for wireless sensor and actor networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF congestion detection and control, real-time and reliable transport protocol, energy efficiency, wireless sensor and actor networks
23Robson de Oliveira Albuquerque, Luis Javier García-Villalba, Rafael Timóteo de Sousa Júnior Enhancing an Integer Challenge-Response Protocol. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spontaneous Self-Organized Networks, Peer Identification, Identification Protocol, Trust, Information Security
23Eun-Jun Yoon, Kee-Young Yoo A New Key Agreement Protocol Based on Chaotic Maps. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Protocol, Key agreement, Session key, Chaotic maps
23Cláudia J. Barenco Abbas, Ricardo González, Nelson Cardenas, L. Javier García-Villalba A proposal of a Wireless Sensor Network Routing Protocol. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless sensor network, routing protocol, 802.15.4
23Eun-Jun Yoon, Kee-Young Yoo An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. Search on Bibsonomy UCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sensor network, Cryptography, Self-organizing, Secure communication, Key exchange protocol
23Hsiao-Hwa Chen, Wee-Teck Tea Hierarchy Schedule Sensing Protocol for CDMA Wireless Networks-Performance Study under Multipath, Multiuser Interference, and Collision-Capture Effect. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multiple access control protocol, wireless network, CDMA, multipath, capture effect
23Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication
23Kil-Woong Jang A Multiple Channel Access Protocol for Ad Hoc Wireless Networks. Search on Bibsonomy Euro-Par The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multiple channel access protocol, ad hoc wireless networks, co-channel interference
23Mohammad Mursalin Akon, Shah Asaduzzaman, Md. Saidur Rahman 0001, Mitsuji Matsumoto Proposal for st-Routing Protocol. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF biconnected graph, st-numbering, routing protocol, multi-path routing
23Arunchandar Vasan 0001, Atif M. Memon ASPIRE: Automated Systematic Protocol Implementation Robustness Evaluation. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF faulty PDUs, protocol data units, stateless protocols, stateful protocols, automated testing, robustness testing
23Colette Johnen Bounded Service Time and Memory Space Optimal Self-Stabilizing Token Circulation Protocol on Unidirectional Rings. Search on Bibsonomy IPDPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anonymous ring, self-stabilization, mutual exclusion, distributed protocol, token circulation, service time, unfair schedule
23Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won Security Enhanced WTLS Handshake Protocol. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WTLS, WAP, active attack, Handshake protocol
23András Faragó, Violet R. Syrotiuk MERIT: A Scalable Approach for Protocol Assessment. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF protocol assessment framework, scalability, mobile ad hoc networks, routing protocols
23Feng Xie, Joseph L. Hammond, Daniel L. Noneaker Evaluation of a Split-Connection Mobile Transport Protocol. Search on Bibsonomy Wirel. Networks The full citation details ... 2003 DBLP  DOI  BibTeX  RDF split-connection transport protocol, wireless Internet access, TCP
23Supakorn Kungpisdan, Bala Srinivasan 0002, Phu Dung Le Lightweight Mobile Credit-Card Payment Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Electronic commerce and payment, credit-card payment protocol, mobile commerce
23Sreekanth Malladi, Jim Alves-Foss What are Multi-Protocol Guessing Attacks and How to Prevent Them. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE
23Robert Siegmund, Dietmar Müller 0001 A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF controller hardware synthesis, interface-based design, protocol specification
23Juha Pärssinen, Niklas von Knorring, Jukka Heinonen, Tellabs Oy, Markku Turunen UML for Protocol Engineering - Extensions and Experiences. Search on Bibsonomy TOOLS (33) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protocol, implementation, SDL, UML profile
23Hiroaki Hagino, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio Store and Flood: A Packet Routing Protocol for Frequently Changing Topology with Ad-Hoc Networks. Search on Bibsonomy ADVIS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ad-hoc networks, routing protocol, mobile computing environments
23Mohsen Guizani A new protocol for optical high-speed packet-switched networks. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optical high-speed packet-switched networks, broadcast passive optical star coupler topology, tunable transmitters, tunable receivers, data channel, signalling channel, data channel wavelength, station, connection-oriented traffic, datagram traffic, LAN applications, MAN applications, packet switching, network architecture, wavelength division multiplexing, access protocols, optical communication, metropolitan area networks, media access protocol, optical fibre networks, optical fibre LAN, control channel
23Kassem Saleh, Robert L. Probert Synthesis of Error-Recoverable Protocol Specifications from Service Specifications. Search on Bibsonomy ICCI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF syntactic correctness, synthesis, error-recovery, protocol design, semantic correctness, Communication software
23Daniel A. Menascé, Gerald J. Popek, Richard R. Muntz A Locking Protocol for Resource Coordination in Distributed Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF concurrency, distributed databases, consistency, crash recovery, locking protocol
23Joffroy Beauquier, Maria Gradinariu, Colette Johnen Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings. Search on Bibsonomy Distributed Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Scheduler, Self-stabilization, Leader election, Randomized protocol, Protocol composition
23Sigrid Gürgens, Javier López 0001 Suitability of a Classical Analysis Method for E-commerce Protocols. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF electronic commerce, cryptographic protocol, Security analysis, automatic theorem proving, protocol validation
23Bhed Bahadur Bista, Y. Ujiie, K. Furuya, Kaoru Takahashi, Norio Shiratori Support System for Constructing Communication Services and Protocols Based on Compositional Approach. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF communication service design, communication protocol design, compositional approach, sequential composition, protocols, LOTOS, service specifications, protocol specifications, parallel composition
23Vijay Varadharajan, Yi Mu 0001 On The Design Of Secure Electronic Payment Schemes For Internet. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS
23James D. Salehi, James F. Kurose, Donald F. Towsley The Performance Impact of Scheduling for Cache Affinity in Parallel Network Processing. Search on Bibsonomy HPDC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF cache affinity, parallel network processing, independent protocol stacks, message throughput, scheduling, scheduling, performance evaluation, parallel processing, protocols, protocol, shared-memory multiprocessor, locking, communication delay, maximum throughput, performance impact
Displaying result #201 - #300 of 60562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license