|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 31248 occurrences of 6773 keywords
|
|
|
Results
Found 60562 publication records. Showing 60562 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Eun-Jun Yoon, Kee-Young Yoo |
An Efficient Authentication and Key Agreement Protocol in RFID System. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Security protocol, Key agreement, RFID system, Session key |
27 | Nan Zhang, Yuanchun Shi, Bin Chang |
Impact of Node Cheating on Gossip-Based Protocol. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
node cheating, reliable, gossip-based protocol, ALM |
27 | Il-Sun You, Kyungsan Cho |
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Mipv6 Binding Update Protocol, CAM-DH, CGA |
27 | Kwangjo Kim, Sangjoon Park, Joonsang Baek |
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party |
27 | Lidia Yamamoto, Christian F. Tschudin |
Experiments on the Automatic Evolution of Protocols Using Genetic Programming. |
WAC |
2005 |
DBLP DOI BibTeX RDF |
protocol evolution, genetic programming, protocol synthesis |
27 | Takuro Kitayama, Akihiko Miyoshi, Tetsuya Saito, Hideyuki Tokuda |
Real-time communication in distributed environment-real-time packet filter approach. |
RTCSA |
1997 |
DBLP DOI BibTeX RDF |
real-time packet filter approach, operating system technology, user-level protocol processing, distributed real-time environment, real-time systems, real-time communication, distributed environment, packet filter, protocol processing |
27 | László Bokor, László Tamás Zeke, Szabolcs Nováczki, Gábor Jeney |
Protocol design and analysis of a HIP-based per-application mobility management platform. |
MOBIWAC |
2009 |
DBLP DOI BibTeX RDF |
application-specific handover management, cross-layer protocol design, hipsim++ simulation framework, inet/omnet++, per-application mobility management, performance evaluation and analysis, host identity protocol (hip), protocol simulation |
27 | Jiabin Xie, Adwait Nerlikar, John R. Glover, Bruce A. McKinley |
An ICU Protocol Development and Management System. |
CBMS |
2000 |
DBLP DOI BibTeX RDF |
ICU, clinical decision-making, computerized protocol, protocol development, protocol, standardization, expert system, decision support, automation, knowledge engineering |
27 | Liqun Chen 0002, Steve Kremer, Mark Dermot Ryan (eds.) |
Formal Protocol Verification Applied, 14.10. - 19.10.2007 |
Formal Protocol Verification Applied |
2008 |
DBLP BibTeX RDF |
|
27 | Cas Cremers |
Complete Characterization of Security Protocols by Pattern Refinement. |
Formal Protocol Verification Applied |
2007 |
DBLP BibTeX RDF |
|
26 | Dawid Kurzyniec, Tomasz Wrzosek, Vaidy S. Sunderam, Aleksander Slominski |
Experiments with multi-protocol RMI in Java. |
Java Grande |
2002 |
DBLP DOI BibTeX RDF |
Java, communication protocols, RMI, RPC |
26 | Mohammad S. Obaidat, Mohammad A. Al-Rousan |
MTR: A Modified Token Ring Protocol and Its Performance. |
ACM Conference on Computer Science |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Hyun-Wook Jin, Junbeom Yoo |
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems. |
SEUS |
2009 |
DBLP DOI BibTeX RDF |
Network Protocol Stacks, Network Gateway, Formal Verification, Protocol Verification, Embedded Operating Systems, Embedded Networks |
26 | László Bokor, Szabolcs Nováczki, László Tamás Zeke, Gábor Jeney |
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++. |
MSWiM |
2009 |
DBLP DOI BibTeX RDF |
INET, handover performance, real-life hip testbed, C++, OMNeT++, simulation framework, host identity protocol (HIP), protocol simulation |
26 | Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki |
A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange. |
Theory Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Random deal of cards, Secret key exchange, Key set protocol, Transformation protocol, Card games |
26 | Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou |
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
SEAD, I-SEAD protocol, Ad hoc networks, simulation experiments, secure routing protocol |
26 | Nancy Alonistioti, Eleni Patouni, Vangelis Gazis |
Generic Architecture and Mechanisms for Protocol Reconfiguration. |
Mob. Networks Appl. |
2006 |
DBLP DOI BibTeX RDF |
protocol component, reconfiguration, binding, protocol stack |
26 | Julien Bringer, Hervé Chabanne, Emmanuelle Dottax |
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. |
SecPerU |
2006 |
DBLP DOI BibTeX RDF |
We here show how a modification of the HB+ protocol thwarts Gilbert et al’s attack, The resulting protocol, HB++, remains a good choice for RFID authentication |
26 | Hongbing Chen, Qun Yang, Manwu Xu |
A Calculus for MAS Interaction Protocol. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
Dialogue protocol, Multi-agent, Interaction protocol, ?-Calculus |
26 | Samir Aknine, Suzanne Pinson, Melvin F. Shakun |
An Extended Multi-Agent Negotiation Protocol. |
Auton. Agents Multi Agent Syst. |
2004 |
DBLP DOI BibTeX RDF |
multi-agent systems, negotiation protocol, contract net protocol |
26 | Supakorn Kungpisdan, Bala Srinivasan 0002, Phu Dung Le |
A Secure Account-Based Mobile Payment Protocol. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Electronic commerce protocol, credit-card payment, cryptographic protocol, mobile payment |
26 | Marc Boyer, Mihaela Sighireanu |
Synthesis and Verification of Constraints in the PGM Protocol. |
FME |
2003 |
DBLP DOI BibTeX RDF |
PGM protocol, real-time multicast protocol, finite and timed model-checking, parameterized verification, constraint synthesis |
26 | Daniel J. Sorin, Manoj Plakal, Anne Condon, Mark D. Hill, Milo M. K. Martin, David A. Wood 0001 |
Specifying and Verifying a Broadcast and a Multicast Snooping Cache Coherence Protocol. |
IEEE Trans. Parallel Distributed Syst. |
2002 |
DBLP DOI BibTeX RDF |
multicast snooping, Cache coherence, protocol verification, protocol specification, memory consistency |
26 | Jehoshua Bruck, Danny Dolev, Ching-Tien Ho, Rimon Orni, H. Raymond Strong |
PCODE: an efficient and reliable collective communication protocol for unreliable broadcast domain. |
IPPS |
1995 |
DBLP DOI BibTeX RDF |
PCODE, unreliable broadcast domain, point-to-point protocol, Silicon Graphics Indigo workstations, broadcast, message passing, programming environments, local area networks, transport protocols, communication protocol, LAN |
26 | P. Venkat Rangan |
Trust Requirements and Performance of a Fast Subtransprot-Level Protocol for Secure Communication. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
trust requirements, fast subtransport-level protocol, authenticated datagram protocol, host-to-host secure channels, agent-to-agent channels, average latency, performance, protocols, data integrity, Ethernet, security of data, secure communication, Sun workstations, maximum throughput |
26 | Radim Burget, Dan Komosny, Milan Simek |
Simulation of Large-Scale IPTV Systems for Fixed and Mobile Networks. (PDF / PS) |
PWC |
2007 |
DBLP DOI BibTeX RDF |
RTP Control protocol, Internet Protocol Television, Receiver Summary Packets, Sender reports, Receiver reports, Petri net, Feedback, IPTV, RTP, Real-time Transport Protocol, RTCP, hierarchical aggregation |
26 | Andrew A. Hanish, Tharam S. Dillon |
Object-oriented modelling of communication protocols for re-use. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
industrial implementations, reuseable software modules, reuseable model elements, message sequence encoding, protocol entities, ISO/OSI Reference Model, generalised model, interlayer communication model, modified TTCN notation, Petri nets, protocols, communication protocols, networking protocols, object-oriented modelling, formal descriptions, protocol implementation, alternating bit protocol |
26 | Bao-Chyuan Jenq, Walter H. Kohler, Donald F. Towsley |
A Queueing Network Model for a Distributed Database Testbed System. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
distributed database testbed system, transaction workload, transaction recovery protocol, write-ahead logging, centralized two-phase commit, protocols, distributed databases, queueing theory, program testing, system recovery, queueing network model, two-phase locking, commit protocol, distributed deadlock detection, concurrency control protocol |
25 | Giampaolo Bella |
Lack of Explicitness Strikes Back (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Norizal Abd Latif, Mohd Fadzil Hassan 0001, Mohd Hilmi Hasan |
Interaction protocol for agent-based e-learning system. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
interaction protocol, electronic institution, e-learning system, agent-based |
25 | Phillip G. Bradford, Sunju Park, Michael H. Rothkopf, Heejin Park |
Protocol completion incentive problems in cryptographic Vickrey auctions. |
Electron. Commer. Res. |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Vickrey actions, Bidder incentives, Yao’s millionaires’ protocol |
25 | Zhiliang Wang, Xia Yin, Chuanming Jing |
A formal method to real-time protocol interoperability testing. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
real-time testing, timed input output automata (TIOA), test generation, interoperability testing, protocol testing |
25 | Ryuichi Takahashi, Kenji Tei, Fuyuki Ishikawa, Yoshiaki Fukazawa, Shinichi Honiden |
A Flexible Protocol Composition for Multi-party Coordination Protocols in Multi-agent Systems. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
Multi-agent system, metadata, protocol composition |
25 | Guoqiang Shu, Yating Hsu, David Lee 0001 |
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
Fuzz testing, Security Testing, Protocol Synthesis |
25 | João Rodrigues, João Ventura 0001, A. M. de Campos, Luís E. T. Rodrigues |
Implementation and analysis of real-time communication protocol compositions. |
Real Time Syst. |
2007 |
DBLP DOI BibTeX RDF |
Protocol composition and execution framework, Real-time, Schedulability analysis, Allocation, Priority assignment |
25 | Juan Caballero, Heng Yin 0001, Zhenkai Liang, Dawn Xiaodong Song |
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
protocol reverse engineering, binary analysis |
25 | Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang |
Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag |
25 | Zheng Qin 0001, Na Li, Dafang Zhang, Nai-Zheng Bian |
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Protocol Anomaly Detection, Chi-Square Distance, DARPA Evaluation Dataset, Intrusion Detection, Markov Chain |
25 | Changjie Wang, Ho-fung Leung |
A secure and private clarke tax voting protocol without trusted authorities. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
Clarke tax voting protocol, universal verification, security, privacy protection, electronic voting, mix network, ElGamal encryption |
25 | Qiujian Sheng, Zhi-Kun Zhao, Shaohui Liu, Zhongzhi Shi |
A Teamwork Protocol for Multi-agent System. |
PRIMA |
2003 |
DBLP DOI BibTeX RDF |
joint intention, ACL (Agent communication language), joint-request, delegation-request, teamwork protocol |
25 | Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn |
Tapping Alert Protocol. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
promiscuous mode, sniffing, tapping alert protocol, cryptography, network security |
25 | Bogdan S. Chlebus, Dariusz R. Kowalski, Tomasz Radzik |
Many-to-Many Communication in Radio Networks. |
Algorithmica |
2009 |
DBLP DOI BibTeX RDF |
Many-to-many communication, Centralized protocol, Broadcast, Randomization, Gossiping, Radio network, Distributed protocol |
25 | Jonathan Billington, Somsak Vanit-Anunchai, Guy Edward Gallasch |
Parameterised Coloured Petri Net Channel Models. |
Trans. Petri Nets Other Model. Concurr. |
2009 |
DBLP DOI BibTeX RDF |
Parameterized Protocol Channel Models, Datagram Congestion Control Protocol, Coloured Petri Nets, Reachability Analysis |
25 | Ka Lun Eddie Law, Wing-Chung Hung |
Channel control for multi-radio multi-channel wireless mesh networks. |
PM2HW2N |
2008 |
DBLP DOI BibTeX RDF |
connection drops, multi-radio multi-channel medium access control protocol, saturation throughput, two-way multiple-segment MAC protocol, delay, wireless mesh networks, 802.11, wireless local area networks |
25 | W. Timothy Strayer |
A Class-Chest for Deriving Transport Protocols. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
class-chest, protocol algorithms, prebuilt infrastructure, Meta-Transport Library, C++ base classes library, Unix environment, rapid prototyping, transport protocols, transport protocols, protocol implementations |
25 | Bobby Krupczak, Kenneth L. Calvert, Mostafa H. Ammar |
Increasing the portability and re-usability of protocol code. |
IEEE/ACM Trans. Netw. |
1997 |
DBLP DOI BibTeX RDF |
protocol deployment, protocol subsystem, portability, protocol implementation |
24 | Lin Cai 0001, Xuemin Shen, Jon W. Mark, Jianping Pan 0001 |
QoS support in Wireless/Wired networks using the TCP-Friendly AIMD protocol. |
IEEE Trans. Wirel. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Aybek Mukhamedov, Mark Dermot Ryan |
Resolve-Impossibility for a Contract-Signing Protocol. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo |
Formal analysis of secure contracting protocol for e-tendering. |
ACSW |
2006 |
DBLP BibTeX RDF |
e-tendering, secure e-contract, e-commerce security |
24 | Toshihiko Yamakami |
An application layer protocol interoperability design model for content evolution in the mobile Internet. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | C. Geldrez, Stan Matwin, Johanne Morin, Robert L. Probert |
An Application of Explanation-Based Learning to Protocol Conformance Testing. |
IEEE Expert |
1990 |
DBLP DOI BibTeX RDF |
|
24 | Sandra L. Murphy, A. Udaya Shankar |
A verified connection management protocol for the transport layer. |
Comput. Commun. Rev. |
1987 |
DBLP DOI BibTeX RDF |
|
24 | Srikanta Tirthapura, Maurice Herlihy |
Self-Stabilizing Distributed Queuing. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
arrow protocol, self-stabilization, Distributed queue |
24 | Daniel Dietterle |
Embedded system protocol design flow based on SDL: from specification to hardware/software implementation. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
protocol accelerator, embedded systems, SDL, protocol engineering, IEEE 802.15.3 |
24 | Daniel Popa, Joanna Tomasik |
On Markov Chain Modelling of Asynchronous Optical CSMA/CA Protocol. |
MASCOTS |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous optical CSMA/CA protocol, Variable size packets, MAC protocol performance, Markov model |
24 | Shigeru Watanabe, Kenshu Seto, Yuji Ishikawa, Satoshi Komatsu, Masahiro Fujita |
Protocol Transducer Synthesis using Divide and Conquer approach. |
ASP-DAC |
2007 |
DBLP DOI BibTeX RDF |
out-of-order transactions, large scale system on a chip, IP-based design, automatic protocol transducer synthesis, nonblocking transactions, design methodologies, communication protocols, protocol conversion, divide and conquer approach |
24 | Moon Jeong Kim, Dong Hoon Lee 0001, Young Ik Eom |
Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
enhanced wireless ad-hoc network, multi-path routing protocol, node/link non-disjoint route, on-demand routing protocol |
24 | N. Sreenath, Balaji Palanisamy |
An Online Distributed Protocol for the Restoration of Connectivity in the Virtual topology after Link failure in IP over WDM networks. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
Reconfiguration of Virtual topology, On-line protocol, Distributed protocol, Link Failures, WDM Optical Network |
24 | Abdelhamid Mellouk, Mustapha Guezouri |
A new methodology to adapt SIP Protocol for voice traffic transported over IP Network. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
multimedia sessions, TURN and STUN Protocol, Session Initiation Protocol, Voice over IP, Network Address Translation |
24 | Emma Carlson, Martin Kubisch, Daniel Hollos |
A receiver based protecting protocol for wireless multi-hop networks. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
JamTDMA, receiver protection, protocol, wireless multi-hop networks, reservation protocol |
24 | Sajal K. Das 0001, Enoch Lee, Kalyan Basu, Sanjoy K. Sen |
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
H.323 protocol, link-level QoS, radio link protocol (RLP), Wireless network, performance study |
24 | Akhil Kumar 0001 |
An Efficient SuperGrid Protocol for High Availability and Load Balancing. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
grid protocol, Crumbling Walls protocol, Paths system, load balancing, availability, quorum system, Server replication |
24 | Wei Mingliang, Qian Yu, Mao Bing, Xie Li |
Protocol Mapping Model for Distributed Multimedia Systems. |
TOOLS (36) |
2000 |
DBLP DOI BibTeX RDF |
protocol mapping, protocol binding, active networks, distributed multimedia system |
24 | Alain J. Mayer, Moti Yung |
Secure Protocol Transformation via "Expansion": From Two-Party to Groups. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy |
24 | Lawrence C. Paulson |
Mechanized proofs for a recursive authentication protocol. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys |
24 | Jörg Ottensmeyer, Peter Martini |
Improving the demand-priority protocol. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
demand-priority protocol, IEEE 802.12, low latency service, high-priority traffic, normal priority traffic, high priority traffic, variable bit rate high priority loads, service strategies, standardization, network topology, network topology, simulation results, medium access control protocol, interactive multimedia applications |
24 | Chung-Ming Huang, Jenq-Muh Hsu, Huei-Yang Lai |
A modified transition tour protocol test method. |
J. Syst. Integr. |
1994 |
DBLP DOI BibTeX RDF |
protocol testing and formal modeling, Computer networks, protocol engineering |
24 | T. Ramalingom, Krishnaiyan Thulasiraman, Anindya Das |
A Matroid-Theoretic Solution to an Assignment Problem in the Conformance Testing of Communication Protocols. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
algorithms, communication, Protocol, graph theory, communication protocol, matroids, protocol testing |
24 | J. William Atwood, Y. Zhang |
A definition of the XTP service and its formal specification. |
LCN |
1995 |
DBLP DOI BibTeX RDF |
XTP service, Xpress Transfer Protocol, transport-level protocol, network-level protocol, unicast environment, multicast environment, specification architecture, data type definitions, process structures, distributed systems, real-time systems, real-time systems, formal specification, formal specification, local area networks, transport protocols, multimedia systems, multimedia systems, open systems, LOTOS |
24 | Madhu Gopinathan, Sriram K. Rajamani |
Enforcing object protocols by combining static and runtime analysis. |
OOPSLA |
2008 |
DBLP DOI BibTeX RDF |
aspect oriented programming, program verification, invariants |
24 | Kaliappa Nadar Ravindran, Kevin A. Kwiat, Gwangyu Ding |
Simulation-Based Validation of Protocols for Distributed Systems. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Hong Wang, Jianping Ma, Bo Chen |
Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
e-Payment protocol, iKP, fairness, strand space |
23 | Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song |
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
botnet infiltration, protocol reverse engineering, binary analysis |
23 | Vehbi C. Gungor, Özgür B. Akan, Ian F. Akyildiz |
A real-time and reliable transport (RT) 2 protocol for wireless sensor and actor networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
congestion detection and control, real-time and reliable transport protocol, energy efficiency, wireless sensor and actor networks |
23 | Robson de Oliveira Albuquerque, Luis Javier García-Villalba, Rafael Timóteo de Sousa Júnior |
Enhancing an Integer Challenge-Response Protocol. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Spontaneous Self-Organized Networks, Peer Identification, Identification Protocol, Trust, Information Security |
23 | Eun-Jun Yoon, Kee-Young Yoo |
A New Key Agreement Protocol Based on Chaotic Maps. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
Security, Protocol, Key agreement, Session key, Chaotic maps |
23 | Cláudia J. Barenco Abbas, Ricardo González, Nelson Cardenas, L. Javier García-Villalba |
A proposal of a Wireless Sensor Network Routing Protocol. (PDF / PS) |
PWC |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor network, routing protocol, 802.15.4 |
23 | Eun-Jun Yoon, Kee-Young Yoo |
An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. |
UCS |
2006 |
DBLP DOI BibTeX RDF |
Sensor network, Cryptography, Self-organizing, Secure communication, Key exchange protocol |
23 | Hsiao-Hwa Chen, Wee-Teck Tea |
Hierarchy Schedule Sensing Protocol for CDMA Wireless Networks-Performance Study under Multipath, Multiuser Interference, and Collision-Capture Effect. |
IEEE Trans. Mob. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Multiple access control protocol, wireless network, CDMA, multipath, capture effect |
23 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
23 | Kil-Woong Jang |
A Multiple Channel Access Protocol for Ad Hoc Wireless Networks. |
Euro-Par |
2005 |
DBLP DOI BibTeX RDF |
multiple channel access protocol, ad hoc wireless networks, co-channel interference |
23 | Mohammad Mursalin Akon, Shah Asaduzzaman, Md. Saidur Rahman 0001, Mitsuji Matsumoto |
Proposal for st-Routing Protocol. |
Telecommun. Syst. |
2004 |
DBLP DOI BibTeX RDF |
biconnected graph, st-numbering, routing protocol, multi-path routing |
23 | Arunchandar Vasan 0001, Atif M. Memon |
ASPIRE: Automated Systematic Protocol Implementation Robustness Evaluation. |
Australian Software Engineering Conference |
2004 |
DBLP DOI BibTeX RDF |
faulty PDUs, protocol data units, stateless protocols, stateful protocols, automated testing, robustness testing |
23 | Colette Johnen |
Bounded Service Time and Memory Space Optimal Self-Stabilizing Token Circulation Protocol on Unidirectional Rings. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
anonymous ring, self-stabilization, mutual exclusion, distributed protocol, token circulation, service time, unfair schedule |
23 | Jin Kwak, Jongsu Han, Soohyun Oh, Dongho Won |
Security Enhanced WTLS Handshake Protocol. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
WTLS, WAP, active attack, Handshake protocol |
23 | András Faragó, Violet R. Syrotiuk |
MERIT: A Scalable Approach for Protocol Assessment. |
Mob. Networks Appl. |
2003 |
DBLP DOI BibTeX RDF |
protocol assessment framework, scalability, mobile ad hoc networks, routing protocols |
23 | Feng Xie, Joseph L. Hammond, Daniel L. Noneaker |
Evaluation of a Split-Connection Mobile Transport Protocol. |
Wirel. Networks |
2003 |
DBLP DOI BibTeX RDF |
split-connection transport protocol, wireless Internet access, TCP |
23 | Supakorn Kungpisdan, Bala Srinivasan 0002, Phu Dung Le |
Lightweight Mobile Credit-Card Payment Protocol. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Electronic commerce and payment, credit-card payment protocol, mobile commerce |
23 | Sreekanth Malladi, Jim Alves-Foss |
What are Multi-Protocol Guessing Attacks and How to Prevent Them. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE |
23 | Robert Siegmund, Dietmar Müller 0001 |
A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
controller hardware synthesis, interface-based design, protocol specification |
23 | Juha Pärssinen, Niklas von Knorring, Jukka Heinonen, Tellabs Oy, Markku Turunen |
UML for Protocol Engineering - Extensions and Experiences. |
TOOLS (33) |
2000 |
DBLP DOI BibTeX RDF |
protocol, implementation, SDL, UML profile |
23 | Hiroaki Hagino, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio |
Store and Flood: A Packet Routing Protocol for Frequently Changing Topology with Ad-Hoc Networks. |
ADVIS |
2000 |
DBLP DOI BibTeX RDF |
ad-hoc networks, routing protocol, mobile computing environments |
23 | Mohsen Guizani |
A new protocol for optical high-speed packet-switched networks. |
LCN |
1995 |
DBLP DOI BibTeX RDF |
optical high-speed packet-switched networks, broadcast passive optical star coupler topology, tunable transmitters, tunable receivers, data channel, signalling channel, data channel wavelength, station, connection-oriented traffic, datagram traffic, LAN applications, MAN applications, packet switching, network architecture, wavelength division multiplexing, access protocols, optical communication, metropolitan area networks, media access protocol, optical fibre networks, optical fibre LAN, control channel |
23 | Kassem Saleh, Robert L. Probert |
Synthesis of Error-Recoverable Protocol Specifications from Service Specifications. |
ICCI |
1990 |
DBLP DOI BibTeX RDF |
syntactic correctness, synthesis, error-recovery, protocol design, semantic correctness, Communication software |
23 | Daniel A. Menascé, Gerald J. Popek, Richard R. Muntz |
A Locking Protocol for Resource Coordination in Distributed Databases. |
ACM Trans. Database Syst. |
1980 |
DBLP DOI BibTeX RDF |
concurrency, distributed databases, consistency, crash recovery, locking protocol |
23 | Joffroy Beauquier, Maria Gradinariu, Colette Johnen |
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings. |
Distributed Comput. |
2007 |
DBLP DOI BibTeX RDF |
Scheduler, Self-stabilization, Leader election, Randomized protocol, Protocol composition |
23 | Sigrid Gürgens, Javier López 0001 |
Suitability of a Classical Analysis Method for E-commerce Protocols. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
electronic commerce, cryptographic protocol, Security analysis, automatic theorem proving, protocol validation |
23 | Bhed Bahadur Bista, Y. Ujiie, K. Furuya, Kaoru Takahashi, Norio Shiratori |
Support System for Constructing Communication Services and Protocols Based on Compositional Approach. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
communication service design, communication protocol design, compositional approach, sequential composition, protocols, LOTOS, service specifications, protocol specifications, parallel composition |
23 | Vijay Varadharajan, Yi Mu 0001 |
On The Design Of Secure Electronic Payment Schemes For Internet. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS |
23 | James D. Salehi, James F. Kurose, Donald F. Towsley |
The Performance Impact of Scheduling for Cache Affinity in Parallel Network Processing. |
HPDC |
1995 |
DBLP DOI BibTeX RDF |
cache affinity, parallel network processing, independent protocol stacks, message throughput, scheduling, scheduling, performance evaluation, parallel processing, protocols, protocol, shared-memory multiprocessor, locking, communication delay, maximum throughput, performance impact |
Displaying result #201 - #300 of 60562 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|