|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Véronique Cortier, Stéphanie Delaune |
Safely composing security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Methods Syst. Des. ![In: Formal Methods Syst. Des. 34(1), pp. 1-36, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Verification, Composition, Security protocols |
24 | Alain Cournier, Stéphane Devismes, Vincent Villain |
Light enabling snap-stabilization of fundamental protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 4(1), pp. 6:1-6:27, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Self- and snap-stabilization, wave protocols, transformer |
24 | Ti Zhou, Mengjun Li, Zhoujun Li 0001 |
Local abstract verification and refinement of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 21-30, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
verification, refinement, abstraction, security protocols |
24 | Khaled Ouafi, Raphael C.-W. Phan |
Traceable Privacy of Recent Provably-Secure RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 479-489, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Authentication protocols, Untraceability |
24 | Willy Picard |
An Algebraic Algorithm for Structural Validation of Social Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIS ![In: Business Information Systems, 10th International Conference, BIS 2007, Poznan, Poland, April 25-27, 2007, Proceedings, pp. 570-583, 2007, Springer, 978-3-540-72034-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
algebraic representation of social protocols, semantical validation, structural validation, Collaboration modeling |
24 | Kumar Viswanath, Katia Obraczka, Gene Tsudik |
Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(1), pp. 28-42, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ad hoc networks, mobile computing, multicast, wireless, routing protocols |
24 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 233-247, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
24 | Feng Zhao, Feng Xi, Zhong Liu |
An Energy-Balanced Strategy for Clustering Protocols in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 612-621, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Clustering protocols, Energy-balanced strategy, Sensor networks, Network lifetime |
24 | Farhan Siddiqui, Sherali Zeadally |
Mobility Protocols for Handoff Management in Heterogeneous Networks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings, pp. 1-12, 2006, Springer, 3-540-45174-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mobility, Networks, Protocols, Heterogeneous, Handoff |
24 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the security of fair non-repudiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(4), pp. 253-262, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Fair non-repudiation, Security protocols, Protocol analysis, Protocol design |
24 | David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 |
OFMC: A symbolic model checker for security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(3), pp. 181-208, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Model checking, Verification, Formal methods, Constraints, Security protocols |
24 | Jialiang Lu, Fabrice Valois, Dominique Barthel |
Range Adjustment for Broadcast Protocols with a Realistic Radio Transceiver Energy Model in Short-Range Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings, pp. 197-206, 2005, Springer, 3-540-30856-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
range adjustment, performance evaluation, energy model, broadcast protocols |
24 | Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 76-88, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, clustering, MAC protocols, jamming, denial-of-service attacks |
24 | Timothy G. Griffin, João L. Sobrinho |
Metarouting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005, pp. 1-12, 2005, ACM, 1-59593-009-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
algebraic routing, path algebras, routing protocols |
24 | David Sinclair, David Gray, Geoff W. Hamilton |
Synthesising Attacks on Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis: Second International Conference, ATVA 2004, Taipei, Taiwan, ROC, October 31-November 3, 2004. Proceedings, pp. 49-63, 2004, Springer, 3-540-23610-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, model checking, cryptographic protocols |
24 | Levente Buttyán, István Vajda |
Towards provable security for ad hoc routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 94-105, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability |
24 | Giorgio Delzanno |
Constraint-Based Verification of Parameterized Cache Coherence Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Methods Syst. Des. ![In: Formal Methods Syst. Des. 23(3), pp. 257-301, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
constraints, abstractions, symbolic model checking, cache coherence protocols |
24 | Lawrence Cabac, Daniel Moldt, Heiko Rölke |
A Proposal for Structuring Petri Net-Based Agent Interaction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICATPN ![In: Applications and Theory of Petri Nets 2003, 24th International Conference, ICATPN 2003, Eindhoven, The Netherlands, June 23-27, 2003, Proceedings, pp. 102-120, 2003, Springer, 3-540-40334-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
agents, high-level Petri nets, Renew, AUML, reference nets, Mulan, agent interaction protocols |
24 | Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel |
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, PODC 2003, Boston, Massachusetts, USA, July 13-16, 2003, pp. 172-181, 2003, ACM, 1-58113-708-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
e-commerce, zero-knowledge proofs, multisignatures, RSA signatures, Fair-exchange protocols |
24 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, Seoul, Korea, August 25-27, 2003, pp. 30-35, 2003, ACM, 1-58113-682-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
24 | Michel Hurfin, Achour Mostéfaoui, Michel Raynal |
A Versatile Family of Consensus Protocols Based on Chandra-Toueg's Unreliable Failure Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(4), pp. 395-408, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
fault-tolerance, quorum, asynchronous distributed system, crash failure, unreliable failure detector, consensus problem, consensus protocols |
24 | Peter McBurney, Simon Parsons, Michael J. Wooldridge |
Desiderata for agent argumentation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 402-409, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
argumentation, interaction protocols, agent communication languages, FIPA, dialogue games |
24 | Mike Ritter, Robert J. Friday, Rodrigo Garcés, Weill San Filippo, Cuong-Thinh Nguyen |
Mobile connectivity protocols and throughput measurements in the Ricochet Microcellular data network (MCDN) system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16-21, 2001., pp. 322-331, 2001, ACM, 1-58113-422-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
MCDN system architecture, Mobility, wireless networks, wireless routing, wireless protocols |
24 | Anindya Datta, Debra E. VanderMeer, Aslihan Celik, Vijay Kumar 0002 |
Broadcast Protocols to Support Efficient Retrieval from Databases by Mobile Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 24(1), pp. 1-79, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
adaptive broadcast protocols, Internet, energy conservation, mobile databases, client-server computing |
24 | Jehan-François Pâris, Darrell D. E. Long, Patrick E. Mantey |
Zero-delay broadcasting protocols for video-on-demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia (1) ![In: Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30 - November 5, 1999, Part 1., pp. 189-197, 1999, ACM, 1-58113-151-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
pyramid broadcasting, video-on-demand, broadcasting protocols, compressed video |
24 | Chie Dou |
Formal Specification of Communication Protocols Based on a Timed-SDL: Validation and Performance Prospects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 22rd EUROMICRO Conference '96, Beyond 2000: Hardware and Software Design Strategies, September 2-5, 1996, Prague, Czech Republic, pp. 484-491, 1996, IEEE Computer Society, 0-8186-7487-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Timed-SDL, performance prospects, CCITT Z.100, probabilistic specifications, performance evaluations, real time systems, formal specification, formal specification, validation, communication protocols, SDL, temporal properties, telecommunication systems, formal notation |
24 | Shubhendu S. Mukherjee, Mark D. Hill |
An evaluation of directory protocols for medium-scale shared-memory multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Supercomputing ![In: Proceedings of the 8th international conference on Supercomputing, ICS 1994, Manchester, UK, July 11-15, 1994, pp. 64-74, 1994, ACM, 0-89791-665-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
directory protocols, multiprocessors, shared-memory, cache coherence, gray code |
24 | Tuomas Aura, Michael Roe, Anish Mohammed |
Experiences with Host-to-Host IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 3-22, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Bruce Christianson |
Anonymous Context Based Role Activation Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 322-328, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Tuomas Aura |
Privacy, Control and Internet Mobility (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 146-150, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Bruce Christianson |
Introduction: Authentic Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 1-3, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Pasi Eronen, Jari Arkko |
Authentication Components: Engineering Experiences and Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 68-77, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Siva Sivavakeesar |
A mobility-based adaptive MAC for supporting real-time applications in multihop ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 56-63, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
quality of service aware MAC, IEEE 802.11, code division multiple access (CDMA), multiple access control (MAC), multihop ad hoc networks |
24 | Carme Àlvarez, Josep Díaz, Jordi Petit, José D. P. Rolim, Maria J. Serna |
Efficient and reliable high level communication in randomly deployed wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 106-110, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, ad hoc networks, middleware, random graphs |
24 | Christian Schindelhauer, Stefan Büttcher, Franz-Josef Rammig |
The design of PaMaNet the Paderborn mobile ad-hoc network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 119-121, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
egoistic caching, mobile ad hoc network, peer-to-peer network, XML-database |
24 | Ross J. Anderson |
What We Can Learn from API Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 288-300, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Giampaolo Bella, Stefano Bistarelli, Fabio Massacci |
A Protocol's Life After Attacks.... ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 3-10, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Chris J. Mitchell, Paulo S. Pagliusi |
Is Entity Authentication Necessary? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 20-33, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Roger M. Needham |
Keynote Address. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 2-4, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Jan Jürjens |
Encapsulating Rules of Prudent Security Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 95-101, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras |
On the Negotiation of Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 188-201, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Michael Roe |
Experiences of Mobile IP Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 4-11, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Jan Jürjens |
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 102-106, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Giampaolo Bella, Lawrence C. Paulson |
A Proof of Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 119-125, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Frank Stajano |
The Resurrecting Duckling - What Next? (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 215-222, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Matt Blaze |
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 54-61, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | George Danezis |
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 223-233, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Virgil D. Gligor, Matt Blaze, John Ioannidis |
Denial of Service - Panel Discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 194-203, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Giampaolo Bella |
Lack of Explicitness Strikes Back (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 94-99, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Lawrence C. Paulson |
Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 82-86, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | |
Afterward. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 256, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 125-127, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Dieter Gollmann |
Insider Fraud (Position Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings, pp. 213-219, 1998, Springer, 3-540-65663-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Raphael Yahalom |
Optimistic Trust with Realistic eNvestigators (Position Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings, pp. 193-202, 1998, Springer, 3-540-65663-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Mostafa Saleh, Mourad Debbabi |
Modeling Security Protocols as Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 253-260, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Modeling cryptographic protocols, Security protocols, Game semantics |
23 | Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí |
Supporting amnesia in log-based recovery protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2007 Euro American conference on Telematics and Information Systems, EATIS 2007, Faro, Portugal, May 14-17, 2007, pp. 25, 2007, 978-1-59593-598-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
amnesia support, recovery protocols, transactional replicated systems, replication protocols |
23 | Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu |
Imposed Route Reuse in Ad Hoc Network Routing Protocols Using Structured Peer-to-Peer Overlay Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(12), pp. 1452-1467, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless, Wireless communication, routing protocols, network protocols |
23 | Christos Bouras, Apostolos Gkamas, Thrasyvoulos Tsiatsos |
Internet Protocols for Synchronous Distance Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 46-50, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
tele-teaching, collaborative medicine, Internet based synchronous distance learning application, multimedia, protocols, distance learning, Internet protocols, Web pages, telematics, client-server model, tele-medicine |
23 | Lawrence Klos, Golden G. Richard III |
Julep: an environment for the evaluation of distributed process recovery protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 18-20 December 2000, Los Angeles, CA, USA, pp. 169-176, 2000, IEEE Computer Society, 0-7695-0975-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Julep, distributed process recovery protocols, object-oriented testbed, process recovery mechanisms, UDP-based object communication service, reliable object-based communication service, Java, Java, protocols, object-oriented programming, programming environments, system recovery, telecommunication channels, recovery mechanisms, communication mechanism |
23 | Vassilios Tsaoussidis, Hussein G. Badr |
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 12-21, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
throughput performance gain, TCP-probing, battery-powered devices, service characteristics, standard TCP, probing mechanism, immediate recovery strategy, wired/wireless channels, TCP header, Tahoe, New Reno, energy performance, wireless networks, mobile devices, energy efficiency, congestion control, computer networks, transport protocols, communication protocols, error correction, energy conservation, error control, telecommunication congestion control, telecommunication standards, network environments, Reno, wired networks |
23 | Ka-Cheong Leung, Victor O. K. Li |
Generalized Load Sharing for Packet-Switching Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 305-314, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
generalized load sharing, multipath communication networks, weighted fair routing, packet level, call level, routing weight vector, packet-by-packet WFR, call-by-call WFR, deterministically fair traffic splitting algorithm, Internet backbone traces, generalized round robin routing, adaptive multipoint path routing protocols, simulation, performance evaluation, Internet, TCP, transport protocols, packet switching, digital simulation, telecommunication network routing, telecommunication traffic, packet-switching networks, service provision, performance bounds, probabilistic routing, packet transmission |
23 | Martín Abadi, Roger M. Needham |
Prudent Engineering Practice for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 22(1), pp. 6-15, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, cryptographic protocols, authentication protocols |
23 | K. Vijayananda |
Distributed fault detection in communication protocols using extended finite state machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), June 3-6, 1996, Tokyo, Japan, Proceedings, pp. 310-318, 1996, IEEE Computer Society, 0-8186-7267-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
distributed fault detection, run-time fault detection, coding defects, memory problems, protocol faults, vocabulary faults, sequencing faults, parallel decomposition method, multiple observers, distributed fault detection mechanism, fault tolerant computing, finite state machines, transport protocols, encoding, communication protocols, fault coverage, extended finite state machines |
23 | Colin Boyd |
Towards a classification of key agreement protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 38-43, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
one-way junctions, classification, protocols, security of data, key agreement protocols |
23 | James W. Gray III, John McLean |
Using temporal logic to specify and verify cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 108-, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
specify, system penetrator, correctness requirements, verification, formal specification, formal methods, cryptography, protocols, formal verification, temporal logic, temporal logic, cryptographic protocols, verify |
23 | Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera |
Some Properties of Timed Token Medium Access Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(8), pp. 858-869, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
timed token medium access protocols, non-real-time traffic, worst-case values, average token rotation time, synchronous traffic, generic periodic pattern, heavy conditions, theoretical lower bounds, real networks, asynchronous overrun problem, multiple priority classes, worst-case assumptions, best-case assumptions, timed-token protocol parameters, network installation, protocols, throughput, local area network, real-time traffic, token networks, electronic messaging |
23 | Muhammad Bilal Anwer, Murtaza Motiwala, Muhammad Mukarram Bin Tariq, Nick Feamster |
SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 183-194, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
network virtualization, NetFPGA |
23 | Jun-Cheol Park, Raymond E. Miller |
A Compositional Approach for Designing Multifunction Time-Dependent Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 1997 International Conference on Network Protocols (ICNP '97), 28-31 October 1997, Atlanta, GA, USA, pp. 105-112, 1997, IEEE Computer Society, 0-8186-8061-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
23 | Hong Liu 0004, Raymond E. Miller |
Partial-Order Validation for Multi-Process Protocols Modeled as Communicating Finite State Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 1996 International Conference on Network Protocols, ICNP 1996, October 29 - November 1, 1996, Columbus, Ohio, USA, pp. 76-83, 1996, IEEE Computer Society, 0-8186-7453-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Hung-Yu Lin, Lein Harn |
Authentication Protocols for Personal Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28 - September 1, 1995., pp. 256-261, 1995, ACM, 0-89791-711-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
23 | Chandramohan A. Thekkath, Thu D. Nguyen, Evelyn Moy, Edward D. Lazowska |
Implementing Network Protocols at User Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, Protocols and Applications, San Francisco, CA, USA, September 13-17, 1993, pp. 64-73, 1993, ACM, 0-89791-619-0. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
TCP/IP |
23 | Teruji Shiroshita |
A Data Processing Performance Model for the OSI Application Layer Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM Symposium on Communications Architectures & Protocols, SIGCOMM 1990, Philadelpia, PA, USA, September 24-27, 1990, pp. 60-68, 1990, ACM, 0-89791-405-8. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
23 | Thien Vo-Dai |
Implementing priorities in multiaccess protocols for optical fiber-based local area netorks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols, SIGCOMM 1986, Stowe, Vermont, United States, August 5-7, 1986, pp. 45-51, 1986, ACM, 0-89791-201-2. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
CSMA-CD |
22 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang |
Efficient Disjointness Tests for Private Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 155-169, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Private Set Disjointness, Private Matching, Secure Multi-Party Computation |
22 | Hoi-Sheung Wilson So, Giang Nguyen, Jean C. Walrand |
Practical synchronization techniques for multi-channel MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, MOBICOM 2006, Los Angeles, CA, USA, September 23-29, 2006, pp. 134-145, 2006, ACM, 1-59593-286-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
recursive least squares (RLS), protocol, wireless, medium access control, time synchronization, clock drift, multi-channel MAC |
22 | Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith |
Parametric Probabilistic Routing in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(4), pp. 529-544, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
simulation, sensor networks, probabilistic routing |
22 | Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith |
Parametric probabilistic sensor network routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wireless Sensor Networks and Applications ![In: Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, San Diego, CA, USA, September 19, 2003, pp. 122-131, 2003, ACM, 1-58113-764-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
simulation, sensor networks, probabilistic routing |
22 | Tatsuaki Okamoto, Kazuo Ohta |
How to Simultaneously Exchange Secrets by General Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 184-192, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Joffroy Beauquier, Janna Burman, Julien Clément 0002, Shay Kutten |
On utilizing speed in networks of mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, PODC 2010, Zurich, Switzerland, July 25-28, 2010, pp. 305-314, 2010, ACM, 978-1-60558-888-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
gathering problem, lower/upper bounds, networks of mobile agents, population protocols, cover time |
22 | Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei |
A calculus of challenges and responses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 51-60, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
static analysis, authentication protocols, process calculi |
22 | Kong Ling Pang, Yang Qin |
The performance comparison of flat routing and hierarchical routing in ad hoc wireless networks in the presence of faulty nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 4th International Conference on Mobile Technology, Applications, and Systems and the 1st International Symposium on Computer Human Interaction in Mobile Technology, Mobility Conference 2007, Singapore, September 10-12, 2007, pp. 139-144, 2007, ACM, 978-1-59593-819-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
performance evaluation, ad hoc networks, wireless networks, routing protocols |
22 | Sunsook Jung, Nisar Hundewale, Alexander Zelikovsky |
GKM over large MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Proceedings of the 6th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2005), May 23-25, 2005, Towson, Maryland, USA, pp. 484-490, 2005, IEEE Computer Society, 0-7695-2294-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ad-hoc On-demand Distance Vector, routing load balancing, node caching, performance evaluation, mobile ad hoc networks, energy efficiency, routing protocols, network simulations |
22 | Lixin Wang, Mounir Hamdi |
HAMAC: An Adaptive Channel Access Protocol for Multimedia Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), October 12-15, 1998, Lafayette, Louisiana, USA, pp. 404-413, 1998, IEEE Computer Society, 0-8186-9014-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
multimedia wireless networks, performance evaluation, Multiple access protocols |
22 | Jen-Yeu Chen, Gopal Pandurangan |
Optimal gossip-based aggregate computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2010: Proceedings of the 22nd Annual ACM Symposium on Parallelism in Algorithms and Architectures, Thira, Santorini, Greece, June 13-15, 2010, pp. 124-133, 2010, ACM, 978-1-4503-0079-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
distributed randomized protocols, lower bounds, probabilistic analysis, gossip-based protocols, aggregate computation |
22 | Hossein Ghodosi, Josef Pieprzyk |
Multi-Party Computation with Omnipresent Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 180-195, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation |
22 | Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey |
Determining a parallel session attack on a key distribution protocol using a model checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24 - 26 November 2008, Linz, Austria, pp. 150-155, 2008, ACM, 978-1-60558-269-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attacks on security protocols, formal analysis of security protocols, parallel session attack, model checking |
22 | Abhijit Saha, Shafqat Ur Rehman, Mikyung Kang, In-Hye Shin, Gyung-Leen Park, Junghoon Lee |
A Comparative Study of Directional Node-Disjoint Multipath Routing in Wireless Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 419-432, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Unipath and Multipath Routing Protocols, Ad hoc Network, Wireless Network, Routing Protocols |
22 | Márk Jelasity, Spyros Voulgaris, Rachid Guerraoui, Anne-Marie Kermarrec, Maarten van Steen |
Gossip-based peer sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 25(3), pp. 8, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
peer sampling service, Gossip-based protocols, epidemic protocols |
22 | Zaichen Zhang, Victor O. K. Li |
Network-Supported Layered Multicast Transport Control for Streaming Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(9), pp. 1332-1344, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network-Supported Protocols, Internet, Multicast, Network Protocols, Streaming Media |
22 | Nipoon Malhotra, Shrish Ranjan, Saurabh Bagchi |
LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005),26-28 October 2005, Orlando, FL, USA, pp. 215-225, 2005, IEEE Computer Society, 0-7695-2463-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Recovery latency, Tree-based multicast protocols, Reliable multicast, Randomized protocols, Buffer utilization |
22 | Christof Fetzer |
Enforcing synchronous system properties on top of timed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 18-20 December 2000, Los Angeles, CA, USA, pp. 185-192, 2000, IEEE Computer Society, 0-7695-0975-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
synchronous system properties, synchronous system model, missed deadline, performance evaluation, performance, computational complexity, complexity, protocols, protocols, fault tolerant computing, timed systems, omission failures, dependable distributed system |
22 | Panagiotis Melas, Ed Zaluska |
Performance of Message-Passing Systems using a Zero-Copy Communication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE PACT ![In: Proceedings of the 1998 International Conference on Parallel Architectures and Compilation Techniques, Paris, France, October 12-18, 1998, pp. 264-, 1998, IEEE Computer Society, 0-8186-8591-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
zero-copy protocols, BIP, communication models performance, latency, communication protocols, bandwidth, cluster of workstations, message-passing systems |
22 | Charles E. Perkins |
Mobile-IP, Ad-Hoc Networking, and Nomadicity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: COMPSAC '96 - 20th Computer Software and Applications Conference, August 19-23, 1996, Seoul, Korea, pp. 472-476, 1996, IEEE Computer Society, 0-8186-7579-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
laptop computers, laptop computers, application interfaces, callback service, Internet, Internet, ad-hoc networking, protocols, wireless LAN, wireless communications, routing protocols, local area networks, Internet Protocol, Mobile-IP, application program interfaces, service location, feature integration, nomadicity |
22 | Yen-Min Huang, Chinya V. Ravishankar |
Designing an Agent Synthesis System for Cross-RPC Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 20(3), pp. 188-198, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
agent synthesis system, cross-RPC communication, RPC protocols, large heterogeneous environment, RPC agents, RPC heterogeneities, agent development costs, cross-RPC performance, distributed systems, parallel programming, protocols, rapid prototyping, software prototyping, remote procedure calls, remote procedure call, telecommunications computing, transport layer, maintenance costs |
21 | Jorge Arturo Cobb, Mohamed G. Gouda |
Flow theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 5(5), pp. 661-674, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
guaranteed performance protocols, rate reservation protocols, protocols, protocol verification |
21 | Santosh S. Venkatesh |
The Science of Making ERORS: What Error Tolerance Implies for Capacity in Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 4(2), pp. 135-144, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
formal protocols, error protocols, densely interconnected neural network architecture, feedforward neural network configurations, neural networks, protocols, fault tolerant computing, neural nets, associative memory, content-addressable storage, error tolerance |
21 | Bruno Ciciani, Daniel M. Dias, Philip S. Yu |
Analysis of Replication in Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 2(2), pp. 247-261, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
optimal replication, approximate analytical model, semi-optimistic protocols, transaction mix, distributed sites, available MIPS, performance evaluation, performance evaluation, protocols, delays, distributed databases, concurrency control, sensitivity analysis, response time, data replication, communications delay, overhead, distributed database systems, resource contention, concurrency control protocols, data contention |
21 | Shundong Li, Daoshun Wang, Yiqi Dai |
Symmetric cryptographic protocols for extended millionaires' problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(6), pp. 974-982, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
extended millionaires’ problem, simulation paradigm, cryptography, secure multiparty computation, symmetric cryptography |
21 | Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor |
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(4), pp. 1575-1591, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Shankar M. Banik, Logan P. Daigle, Tao-hsiang Chang |
Implementation and empirical evaluations of floor control protocols on PlanetLab network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
floor control protocol, performance evaluation |
Displaying result #401 - #500 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|