The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Cas J. F. Cremers The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Ashish Goel, Hamid Nazerzadeh Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
26Yuh-Ren Tsai Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Ralf Küsters, Tomasz Truderung On the Automatic Analysis of Recursive Security Protocols with XOR. Search on Bibsonomy STACS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Deger Cenk Erdil, Michael J. Lewis Grid Resource Scheduling with Gossiping Protocols. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26José Ghislain Quenum, Samir Aknine, Jean-Pierre Briot, Shinichi Honiden A Modeling Framework for Generic Agent Interaction Protocols. Search on Bibsonomy DALT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Leila Jalali, Ahmad Abdollahzadeh, Saeed Aliakbarian DBMSS: An event-based simulator for analyzing concurrency protocols in database systems. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Federico Chesani Formalization and Verification of Interaction Protocols. Search on Bibsonomy ICLP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ashok U. Mallya, Munindar P. Singh A Semantic Approach for Designing E-Business Protocols. Search on Bibsonomy SWSWPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass Universally Composable Protocols with Relaxed Set-Up Assumptions. Search on Bibsonomy FOCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Ashok U. Mallya, Munindar P. Singh A Semantic Approach for Designing E-Business Protocols. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Ralf Küsters, Thomas Wilke Automata-Based Analysis of Recursive Cryptographic Protocols. Search on Bibsonomy STACS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 Rushing attacks and defense in wireless ad hoc network routing protocols. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ad hoc network routing, security, routing, rushing
26Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Hugo Krawczyk SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Carlos O'Ryan, Fred Kuhns, Douglas C. Schmidt, Ossama Othman, Jeff Parsons The Design and Performance of a Pluggable Protocols Framework for Real-Time Distributed Object Computing Middleware. Search on Bibsonomy Middleware The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Mukund Raghavachari, Anne Rogers Ace: a language for parallel programming with customizable protocols. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF parallel processing
26Yuri Breitbart, Raghavan Komondoor, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz Update Propagation Protocols For Replicated Databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Mukund Raghavachari, Anne Rogers Ace: Linguistic Mechanisms for Customizable Protocols. Search on Bibsonomy PPoPP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26Sebastian Gajek A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF browser-based protocols, security model, Universal Composability
26Osama S. Youness, Wail Elkilani, Waiel F. Abd El-Wahed, Fawzy A. Torkey A Robust Methodology for Performance Evaluation of Communication Networks Protocols. Search on Bibsonomy CNSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Performance evaluation, Network protocols, Stochastic Petri nets, Decomposition techniques
26Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha Understanding the intruder through attacks on cryptographic protocols. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, authentication, security protocols, attacks
26Gergely Ács, Levente Buttyán, István Vajda Modelling adversaries and security objectives for routing protocols in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, routing protocols, provable security, simulatability, adversary model
26Rafal Leszczyna, Janusz Górski Performance analysis of untraceability protocols for mobile agents using an adaptable framework. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, performance evaluation, privacy, mobile agents, anonymity, security protocols, ACM proceedings, untraceability
26Ralf Küsters On the decidability of cryptographic protocols with open-ended data structures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Complexity, Cryptographic protocols, Decidability, Transducers
26Munindar P. Singh, Amit K. Chopra, Nirmit Desai, Ashok U. Mallya Protocols for processes: programming in the large for open systems. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business processes, open systems, interaction protocols
26Pinar Yolum, Munindar P. Singh Reasoning about Commitments in the Event Calculus: An Approach for Specifying and Executing Protocols. Search on Bibsonomy Ann. Math. Artif. Intell. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF methodologies, commitments, agent communication languages and protocols
26Munindar P. Singh, Amit K. Chopra, Nirmit Desai, Ashok U. Mallya Protocols for processes: programming in the large for open systems (extended abstract). Search on Bibsonomy OOPSLA Companion The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business processes, open systems, interaction protocols
26Alessandro Armando, Luca Compagna, Pierre Ganty SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. Search on Bibsonomy FME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SAT encodings, security protocols, bounded model-checking, SAT-solvers
26Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack Upgrading transport protocols using untrusted mobile code. Search on Bibsonomy SOSP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF untrusted mobile code, implementation, transport protocols, deployment, TCP-friendliness
26Ralf H. Reussner Counter-Constrained Finite State Machines: A New Model for Component Protocols with Resource-Dependencies. Search on Bibsonomy SOFSEM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF software component protocols, finite state machine extension, decidable inclusion check, interoperability, substitutability
26Mehran Abolhasan, Tadeusz A. Wysocki, Eryk Dutkiewicz A Review of Current On-demand Routing Protocols. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Uni- cast routing protocols, Mobile ad-hoc networks, On-demand routing
26Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero Verifying security protocols with Brutus. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF authentication and secure payment protocols, model-checking, formal methods
26Inês de Castro Dutra, Vítor Santos Costa, Ricardo Bianchini The Impact of Cache Coherence Protocols on Parallel Logic Programming Systems. Search on Bibsonomy Computational Logic The full citation details ... 2000 DBLP  DOI  BibTeX  RDF dsm architectures, performance evaluation, parallelism, logic programming, cache coherence protocols
26Gurdip Singh, Jun Wu Modular Object-Oriented Design of Distributed Protocols. Search on Bibsonomy TOOLS (34) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Distributed systems, Protocols, Synchronization, Composition
26Fong Pong, Michel Dubois 0001 Formal Verification of Complex Coherence Protocols Using Symbolic State Models. Search on Bibsonomy J. ACM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF state abstraction, state enumeration methods, formal methods, shared-memory multiprocessors, cache coherence protocols
26Micah Adler, Bruce M. Maggs Protocols for Asymmetric Communication Channels. Search on Bibsonomy FOCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF communication complexity, network protocols, asymmetric
26Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin WAR: Wireless Anonymous Routing. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Michael Menth, Rüdiger Martin Performance Evaluation of the Extensions for Control Message Retransmissions in RSVP. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Peter Ryan 0001 Open Questions (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Ross J. Anderson The Correctness of Crypto Transaction Sets (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Tuomas Aura, Pekka Nikander, Jussipekka Leiwo DOS-Resistant Authentication with Client Puzzles. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Lawrence C. Paulson Inductive Analysis of the Internet Protocol TLS (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Costas Busch, Malik Magdon-Ismail, Fikret Sivrikaya, Bülent Yener Contention-free MAC protocols for asynchronous wireless sensor networks. Search on Bibsonomy Distributed Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TDMA protocols, Wireless sensor networks, Self-stabilization, MAC protocols
26Khaled Harfoush, Azer Bestavros, John W. Byers Robust Identification of Shared Losses Using End-to-End Unicast Probes. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF robust identification, shared losses, end-to-end unicast probes, Internet transport protocols, end-to-end measurements correlation, per-connection state, shared network resources, aggregate congestion control, QoS admission control, connection scheduling, mirror site selection, conditional Bayesian probing, network conditions, memoryless Markovian probing, convergence, transport protocols, identification, accuracy, digital simulation, simulation results, Bayes methods, telecommunication congestion control, convergence of numerical methods
26Martín Abadi Explicit Communication Revisited: Two New Attacks on Authentication Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, authentication, Cryptography, cryptographic protocols, authentication protocols
26Nevin Heintze, J. D. Tygar A Model for Secure Protocols and Their Compositions. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF logic of authentication, protocols-composition of, security, model, model checking, communication, Authentication, formal methods, cryptography, protocols, composition, time, computer security, clocks, protocol analysis, protocol analysis, timed models
26Stephen H. Brackin A HOL extension of GNY for automatically analyzing cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic
26A. W. Roscoe 0001 Modelling and verifying key-exchange protocols using CSP and FDR. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF model-checking, formal specification, protocols, formal verification, process algebra, CSP, communicating sequential processes, FDR, key-exchange protocols
26Aviel D. Rubin Extending NCP for protocols using public keys. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules
26Aruna Kumar Kompella, Indra Widjaja Burst-level admission control protocols with multirate traffic and arbitrary network topology. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF burst-level admission control protocols, multirate traffic, random access techniques, fell-and-wait, tell-and-go, end-to-end transfer delay, blocking probability characteristics, peak bit rates, performance, fairness, throughput, network topology, ATM networks, access protocols, reduced load approximation
26Ali Assi 0001, Bozena Kaminska Modeling of communication protocols in VHDL. Search on Bibsonomy Great Lakes Symposium on VLSI The full citation details ... 1995 DBLP  DOI  BibTeX  RDF ISO/CCITT class O, VLSI, VLSI, high level synthesis, VHDL, transport protocols, transport protocol, communication protocols, hardware description languages, hardware implementations, high level design, ISO standards
26Krishna M. Sivalingam Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks. Search on Bibsonomy HPDC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF hybrid media access protocols, optical WDM networks, all-optical wavelength division multiplexed networks, collisionless communication, performance evaluation, multicast, broadcast, multiprocessor interconnection networks, interconnection, shared memory systems, distributed memory systems, simulation models, wavelength division multiplexing, access protocols, optical communication, system parameters, DSM system
26M. M. Mourad, Ahmed N. Tantawy Video-on-demand: experience with protocols and their implementation. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF interactive multimedia information systems, digitally compressed information, MPEG-2 formats, standard protocols, MPEG-2 Digital Storage Media Command and Control protocol, video coding, transport protocols, video-on-demand, multimedia communication, interactive television, video signal processing, information services, information networks, interactive video
26Jiayue He, Jennifer Rexford, Mung Chiang Don't optimize existing protocols, design optimizable protocols. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Sandeep S. Kulkarni, Bezawada Bruhadeshwar A Family of Collusion Resistant Protocols for Instantiating Security. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Instantiating security, Security, Collusion Resistance
26Alexander Artikis, Frank Guerin, Jeremy Pitt Integrating Interaction Protocols and Internet Protocols for Agent-Mediated E-Commerce. Search on Bibsonomy AMEC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services. Search on Bibsonomy ICNP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
25Vishwas S. Puttasubbappa, Harry G. Perros Access Protocols to Support Different Service Classes in an Optical Burst Switching Ring. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Optical burst switching, access protocols, MAN, service classes
24Gustavus J. Simmons Cryptanalysis and Protocol Failures (abstract). Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
24Yehuda Lindell, Anna Lysyanskaya, Tal Rabin On the composition of authenticated Byzantine Agreement. Search on Bibsonomy J. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated Byzantine Agreement, lower bounds, randomized protocols, protocol composition
24Pinar Yolum Towards design tools for protocol development. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocols, tools, commitments
24Xin Yuan 0001, Rami G. Melhem, Rajiv Gupta 0001 Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF mesh-like networks, path reservation, routing protocols, distributed control, wavelength-division multiplexing, time-division multiplexing, Optical interconnection networks
24Mark A. Heinrich, Vijayaraghavan Soundararajan, John L. Hennessy, Anoop Gupta A Quantitative Analysis of the Performance and Scalability of Distributed Shared Memory. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF flexible node controller, bitvector, dynamic pointer allocation, controller occupancy, distributed shared memory, performance comparison, FLASH, Cache coherence protocols, MAGIC, COMA, SCI, scalable multiprocessors
24Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik Secure Group Communication Using Robust Contributory Key Agreement. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contributory group key agreement, fault tolerance, distributed systems, group communication, cryptographic protocols, network protocols, Security and protection
24Sudhir Srinivasan, Paul F. Reynolds Jr. Elastic Time. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF aggressiveness, near-perfect state information, risk, adaptive protocols, optimistic protocols
24Kwok-Wa Lam, Sheung-lun Hung A pre-emptive transaction scheduling protocol for controlling priority inversion. Search on Bibsonomy RTCSA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF pre-emptive transaction scheduling protocol, hard real-time database systems, priority inversion problem, system schedulability, blocking delay, transaction preemptability, worst-case scheduling conditions, semantics, data integrity, data consistency, priority inversion, concurrency control protocols, real-time transactions, priority ceiling protocols
24Satish Rao, Torsten Suel, Thanasis Tsantilas, Mark W. Goudreau Efficient communication using total-exchange. Search on Bibsonomy IPPS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF architecture-independent programming language, logical parallelism, balanced communication patterns, N-processor network, parallel processing, parallel programming, parallel programs, parallel computing, protocols, protocols, h-relation
24Bülent Tavli, Wendi B. Heinzelman Energy and Spatial Reuse Efficient Network-Wide Real-Time Data Broadcasting in Mobile Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile computing, wireless communication, Low-power design, routing protocols, network topology, network protocols, data communications, protocol verification, algorithm/protocol design and analysis, distributed protocols, network communications, mobile communication systems, energy-aware systems, protocol architecture, access schemes
24M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
24Jeonghoon Mo, Hoi-Sheung Wilson So, Jean C. Walrand Comparison of Multichannel MAC Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance, 802.11, Multi-Channel MAC
24S. Jayashree, B. S. Manoj 0001, C. Siva Ram Murthy Network lifetime driven MAC protocols for ad hoc wireless networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network (node) lifetime, Battery characteristics, Markov chain, MAC protocol, Ad hoc wireless network
24Luiz Henrique A. Correia, José Marcos S. Nogueira Transmission power control techniques for MAC protocols in wireless sensor networks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Bezawada Bruhadeshwar, Kishore Kothapalli A Family of Collusion Resistant Symmetric Key Protocols for Authentication. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Key Distribution, Collusion resistance
24Steve Kremer, Antoine Mercier 0002, Ralf Treinen Proving Group Protocols Secure Against Eavesdroppers. Search on Bibsonomy IJCAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Abderrahim Benslimane, Cédric Ferraris, Abdelhakim Hafid A Comparative Analysis of Multicast Protocols for Small MANET Groups. Search on Bibsonomy ADHOC-NOW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Muhammad Saleem 0001, Muddassar Farooq A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Murali Krishna Ramanathan, Ananth Grama, Suresh Jagannathan Path-Sensitive Inference of Function Precedence Protocols. Search on Bibsonomy ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Asad Amir Pirzada, Chris McDonald, Amitava Datta Performance Comparison of Trust-Based Reactive Routing Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, network, Trust, protocol, ad hoc
24Huafei Zhu, Tieyan Li, Feng Bao 0001 Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Munindar P. Singh Interaction-Oriented Programming: Concepts, Theories, and Results on Commitment Protocols. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Aurélien Bouteiller, Boris Collin, Thomas Hérault, Pierre Lemarinier, Franck Cappello Impact of Event Logger on Causal Message Logging Protocols for Fault Tolerant MPI. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock Errors in Computational Complexity Proofs for Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Prawit Chumchu, Roksana Boreli, Aruna Seneviratne Performance Analysis of Reliable Multicast Transport Protocols for GEO Satellite Networks. Search on Bibsonomy MASCOTS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Ashok U. Mallya, Munindar P. Singh A semantic approach for designing business protocols. Search on Bibsonomy WWW (Alternate Track Papers & Posters) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business process composition, web services, commitments
24Ashok U. Mallya, Munindar P. Singh A Semantic Approach for Designing Commitment Protocols. Search on Bibsonomy AAMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24E. Allen Emerson, Vineet Kahlon Rapid Parameterized Model Checking of Snoopy Cache Coherence Protocols. Search on Bibsonomy TACAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Dimitrios Koukopoulos, Marios Mavronicolas, Sotiris E. Nikoletseas, Paul G. Spirakis On the Stability of Compositions of Universally Stable, Greedy Contention-Resolution Protocols. Search on Bibsonomy DISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Ichiro Satoh Dynamic Configuration of Agent Migration Protocols for the Internet. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF agent migration, protocol, mobile agent, adaptive system
24Olivier Pereira, Jean-Jacques Quisquater A Security Analysis of the Cliques Protocols Suites. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Håkan Grahn, Per Stenström Relative Performance of Hardware and Software-Only Directory Protocols Under Latency Tolerating and Reducing Techniques. Search on Bibsonomy IPPS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Eiichiro Fujisaki, Tatsuaki Okamoto Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Ricardo Bianchini, Enrique V. Carrera, Leonidas I. Kontothanassis The Interaction of Parallel Programming Constructs and Coherence Protocols. Search on Bibsonomy PPoPP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Satish Chandra 0001, Brad Richards, James R. Larus Teapot: Language Support for Writing Memory Coherence Protocols. Search on Bibsonomy PLDI The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24Divyakant Agrawal, Amr El Abbadi, Richard Jeffers Using Delayed Commitment in Locking Protocols for Real-Time Databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
24John G. Waclawsky, Ashok K. Agrawala Dynamic Queue Behavior in Networks with Window Protocols. Search on Bibsonomy SIGMETRICS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Bo Zhang 0016, Binoy Ravindran Brief announcement: queuing or priority queuing? on the design of cache-coherence protocols for distributed transactional memory. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distributed queuing, transactional memory, cache-coherence protocols
24Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik Universally Composable RFID Identification and Authentication Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication and key-exchange protocols, universal composability, RFID security
Displaying result #301 - #400 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license