The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Véronique Cortier, Stéphanie Delaune Safely composing security protocols. Search on Bibsonomy Formal Methods Syst. Des. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Verification, Composition, Security protocols
24Alain Cournier, Stéphane Devismes, Vincent Villain Light enabling snap-stabilization of fundamental protocols. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self- and snap-stabilization, wave protocols, transformer
24Ti Zhou, Mengjun Li, Zhoujun Li 0001 Local abstract verification and refinement of security protocols. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verification, refinement, abstraction, security protocols
24Khaled Ouafi, Raphael C.-W. Phan Traceable Privacy of Recent Provably-Secure RFID Protocols. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, RFID, Authentication protocols, Untraceability
24Willy Picard An Algebraic Algorithm for Structural Validation of Social Protocols. Search on Bibsonomy BIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algebraic representation of social protocols, semantical validation, structural validation, Collaboration modeling
24Kumar Viswanath, Katia Obraczka, Gene Tsudik Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ad hoc networks, mobile computing, multicast, wireless, routing protocols
24Maurizio Adriano Strangio On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key agreement protocols, key compromise impersonation
24Feng Zhao, Feng Xi, Zhong Liu An Energy-Balanced Strategy for Clustering Protocols in Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clustering protocols, Energy-balanced strategy, Sensor networks, Network lifetime
24Farhan Siddiqui, Sherali Zeadally Mobility Protocols for Handoff Management in Heterogeneous Networks. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mobility, Networks, Protocols, Heterogeneous, Handoff
24Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the security of fair non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Fair non-repudiation, Security protocols, Protocol analysis, Protocol design
24David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 OFMC: A symbolic model checker for security protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Model checking, Verification, Formal methods, Constraints, Security protocols
24Jialiang Lu, Fabrice Valois, Dominique Barthel Range Adjustment for Broadcast Protocols with a Realistic Radio Transceiver Energy Model in Short-Range Wireless Networks. Search on Bibsonomy MSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF range adjustment, performance evaluation, energy model, broadcast protocols
24Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, clustering, MAC protocols, jamming, denial-of-service attacks
24Timothy G. Griffin, João L. Sobrinho Metarouting. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algebraic routing, path algebras, routing protocols
24David Sinclair, David Gray, Geoff W. Hamilton Synthesising Attacks on Cryptographic Protocols. Search on Bibsonomy ATVA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, model checking, cryptographic protocols
24Levente Buttyán, István Vajda Towards provable security for ad hoc routing protocols. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability
24Giorgio Delzanno Constraint-Based Verification of Parameterized Cache Coherence Protocols. Search on Bibsonomy Formal Methods Syst. Des. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF constraints, abstractions, symbolic model checking, cache coherence protocols
24Lawrence Cabac, Daniel Moldt, Heiko Rölke A Proposal for Structuring Petri Net-Based Agent Interaction Protocols. Search on Bibsonomy ICATPN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF agents, high-level Petri nets, Renew, AUML, reference nets, Mulan, agent interaction protocols
24Jung-Min Park 0001, Edwin K. P. Chong, Howard Jay Siegel Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF e-commerce, zero-knowledge proofs, multisignatures, RSA signatures, Fair-exchange protocols
24Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Analyzing the energy consumption of security protocols. Search on Bibsonomy ISLPED The full citation details ... 2003 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
24Michel Hurfin, Achour Mostéfaoui, Michel Raynal A Versatile Family of Consensus Protocols Based on Chandra-Toueg's Unreliable Failure Detectors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fault-tolerance, quorum, asynchronous distributed system, crash failure, unreliable failure detector, consensus problem, consensus protocols
24Peter McBurney, Simon Parsons, Michael J. Wooldridge Desiderata for agent argumentation protocols. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF argumentation, interaction protocols, agent communication languages, FIPA, dialogue games
24Mike Ritter, Robert J. Friday, Rodrigo Garcés, Weill San Filippo, Cuong-Thinh Nguyen Mobile connectivity protocols and throughput measurements in the Ricochet Microcellular data network (MCDN) system. Search on Bibsonomy MobiCom The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MCDN system architecture, Mobility, wireless networks, wireless routing, wireless protocols
24Anindya Datta, Debra E. VanderMeer, Aslihan Celik, Vijay Kumar 0002 Broadcast Protocols to Support Efficient Retrieval from Databases by Mobile Users. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF adaptive broadcast protocols, Internet, energy conservation, mobile databases, client-server computing
24Jehan-François Pâris, Darrell D. E. Long, Patrick E. Mantey Zero-delay broadcasting protocols for video-on-demand. Search on Bibsonomy ACM Multimedia (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF pyramid broadcasting, video-on-demand, broadcasting protocols, compressed video
24Chie Dou Formal Specification of Communication Protocols Based on a Timed-SDL: Validation and Performance Prospects. Search on Bibsonomy EUROMICRO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Timed-SDL, performance prospects, CCITT Z.100, probabilistic specifications, performance evaluations, real time systems, formal specification, formal specification, validation, communication protocols, SDL, temporal properties, telecommunication systems, formal notation
24Shubhendu S. Mukherjee, Mark D. Hill An evaluation of directory protocols for medium-scale shared-memory multiprocessors. Search on Bibsonomy International Conference on Supercomputing The full citation details ... 1994 DBLP  DOI  BibTeX  RDF directory protocols, multiprocessors, shared-memory, cache coherence, gray code
24Tuomas Aura, Michael Roe, Anish Mohammed Experiences with Host-to-Host IPsec. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Bruce Christianson Anonymous Context Based Role Activation Mechanism. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Tuomas Aura Privacy, Control and Internet Mobility (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Bruce Christianson Introduction: Authentic Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Pasi Eronen, Jari Arkko Authentication Components: Engineering Experiences and Guidelines. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Siva Sivavakeesar A mobility-based adaptive MAC for supporting real-time applications in multihop ad-hoc networks. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quality of service aware MAC, IEEE 802.11, code division multiple access (CDMA), multiple access control (MAC), multihop ad hoc networks
24Carme Àlvarez, Josep Díaz, Jordi Petit, José D. P. Rolim, Maria J. Serna Efficient and reliable high level communication in randomly deployed wireless sensor networks. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, ad hoc networks, middleware, random graphs
24Christian Schindelhauer, Stefan Büttcher, Franz-Josef Rammig The design of PaMaNet the Paderborn mobile ad-hoc network. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF egoistic caching, mobile ad hoc network, peer-to-peer network, XML-database
24Ross J. Anderson What We Can Learn from API Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Giampaolo Bella, Stefano Bistarelli, Fabio Massacci A Protocol's Life After Attacks.... Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Chris J. Mitchell, Paulo S. Pagliusi Is Entity Authentication Necessary? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Roger M. Needham Keynote Address. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Jan Jürjens Encapsulating Rules of Prudent Security Engineering. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras On the Negotiation of Access Control Policies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Michael Roe Experiences of Mobile IP Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Jan Jürjens Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Giampaolo Bella, Lawrence C. Paulson A Proof of Non-repudiation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Frank Stajano The Resurrecting Duckling - What Next? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Matt Blaze Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24George Danezis An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Virgil D. Gligor, Matt Blaze, John Ioannidis Denial of Service - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Giampaolo Bella Lack of Explicitness Strikes Back (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Lawrence C. Paulson Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24 Afterward. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Ross J. Anderson The Correctness of Crypto Transaction Sets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Dieter Gollmann Insider Fraud (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Raphael Yahalom Optimistic Trust with Realistic eNvestigators (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Mohamed Mostafa Saleh, Mourad Debbabi Modeling Security Protocols as Games. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modeling cryptographic protocols, Security protocols, Game semantics
23Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí Supporting amnesia in log-based recovery protocols. Search on Bibsonomy EATIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF amnesia support, recovery protocols, transactional replicated systems, replication protocols
23Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu Imposed Route Reuse in Ad Hoc Network Routing Protocols Using Structured Peer-to-Peer Overlay Routing. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless, Wireless communication, routing protocols, network protocols
23Christos Bouras, Apostolos Gkamas, Thrasyvoulos Tsiatsos Internet Protocols for Synchronous Distance Learning. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF tele-teaching, collaborative medicine, Internet based synchronous distance learning application, multimedia, protocols, distance learning, Internet protocols, Web pages, telematics, client-server model, tele-medicine
23Lawrence Klos, Golden G. Richard III Julep: an environment for the evaluation of distributed process recovery protocols. Search on Bibsonomy PRDC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Julep, distributed process recovery protocols, object-oriented testbed, process recovery mechanisms, UDP-based object communication service, reliable object-based communication service, Java, Java, protocols, object-oriented programming, programming environments, system recovery, telecommunication channels, recovery mechanisms, communication mechanism
23Vassilios Tsaoussidis, Hussein G. Badr TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF throughput performance gain, TCP-probing, battery-powered devices, service characteristics, standard TCP, probing mechanism, immediate recovery strategy, wired/wireless channels, TCP header, Tahoe, New Reno, energy performance, wireless networks, mobile devices, energy efficiency, congestion control, computer networks, transport protocols, communication protocols, error correction, energy conservation, error control, telecommunication congestion control, telecommunication standards, network environments, Reno, wired networks
23Ka-Cheong Leung, Victor O. K. Li Generalized Load Sharing for Packet-Switching Networks. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF generalized load sharing, multipath communication networks, weighted fair routing, packet level, call level, routing weight vector, packet-by-packet WFR, call-by-call WFR, deterministically fair traffic splitting algorithm, Internet backbone traces, generalized round robin routing, adaptive multipoint path routing protocols, simulation, performance evaluation, Internet, TCP, transport protocols, packet switching, digital simulation, telecommunication network routing, telecommunication traffic, packet-switching networks, service provision, performance bounds, probabilistic routing, packet transmission
23Martín Abadi, Roger M. Needham Prudent Engineering Practice for Cryptographic Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF security, authentication, Cryptography, cryptographic protocols, authentication protocols
23K. Vijayananda Distributed fault detection in communication protocols using extended finite state machines. Search on Bibsonomy ICPADS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF distributed fault detection, run-time fault detection, coding defects, memory problems, protocol faults, vocabulary faults, sequencing faults, parallel decomposition method, multiple observers, distributed fault detection mechanism, fault tolerant computing, finite state machines, transport protocols, encoding, communication protocols, fault coverage, extended finite state machines
23Colin Boyd Towards a classification of key agreement protocols. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF one-way junctions, classification, protocols, security of data, key agreement protocols
23James W. Gray III, John McLean Using temporal logic to specify and verify cryptographic protocols. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF specify, system penetrator, correctness requirements, verification, formal specification, formal methods, cryptography, protocols, formal verification, temporal logic, temporal logic, cryptographic protocols, verify
23Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera Some Properties of Timed Token Medium Access Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF timed token medium access protocols, non-real-time traffic, worst-case values, average token rotation time, synchronous traffic, generic periodic pattern, heavy conditions, theoretical lower bounds, real networks, asynchronous overrun problem, multiple priority classes, worst-case assumptions, best-case assumptions, timed-token protocol parameters, network installation, protocols, throughput, local area network, real-time traffic, token networks, electronic messaging
23Muhammad Bilal Anwer, Murtaza Motiwala, Muhammad Mukarram Bin Tariq, Nick Feamster SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network virtualization, NetFPGA
23Jun-Cheol Park, Raymond E. Miller A Compositional Approach for Designing Multifunction Time-Dependent Protocols. Search on Bibsonomy ICNP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
23Hong Liu 0004, Raymond E. Miller Partial-Order Validation for Multi-Process Protocols Modeled as Communicating Finite State Machines. Search on Bibsonomy ICNP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
23Hung-Yu Lin, Lein Harn Authentication Protocols for Personal Communication Systems. Search on Bibsonomy SIGCOMM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23Chandramohan A. Thekkath, Thu D. Nguyen, Evelyn Moy, Edward D. Lazowska Implementing Network Protocols at User Level. Search on Bibsonomy SIGCOMM The full citation details ... 1993 DBLP  DOI  BibTeX  RDF TCP/IP
23Teruji Shiroshita A Data Processing Performance Model for the OSI Application Layer Protocols. Search on Bibsonomy SIGCOMM The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
23Thien Vo-Dai Implementing priorities in multiaccess protocols for optical fiber-based local area netorks. Search on Bibsonomy SIGCOMM The full citation details ... 1986 DBLP  DOI  BibTeX  RDF CSMA-CD
22Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang Efficient Disjointness Tests for Private Datasets. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private Set Disjointness, Private Matching, Secure Multi-Party Computation
22Hoi-Sheung Wilson So, Giang Nguyen, Jean C. Walrand Practical synchronization techniques for multi-channel MAC. Search on Bibsonomy MobiCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF recursive least squares (RLS), protocol, wireless, medium access control, time synchronization, clock drift, multi-channel MAC
22Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith Parametric Probabilistic Routing in Sensor Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF simulation, sensor networks, probabilistic routing
22Christopher L. Barrett, Stephan J. Eidenbenz, Lukas Kroc, Madhav V. Marathe, James P. Smith Parametric probabilistic sensor network routing. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF simulation, sensor networks, probabilistic routing
22Tatsuaki Okamoto, Kazuo Ohta How to Simultaneously Exchange Secrets by General Assumptions. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
22Joffroy Beauquier, Janna Burman, Julien Clément 0002, Shay Kutten On utilizing speed in networks of mobile agents. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF gathering problem, lower/upper bounds, networks of mobile agents, population protocols, cover time
22Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei A calculus of challenges and responses. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF static analysis, authentication protocols, process calculi
22Kong Ling Pang, Yang Qin The performance comparison of flat routing and hierarchical routing in ad hoc wireless networks in the presence of faulty nodes. Search on Bibsonomy Mobility Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF performance evaluation, ad hoc networks, wireless networks, routing protocols
22Sunsook Jung, Nisar Hundewale, Alexander Zelikovsky GKM over large MANET. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad-hoc On-demand Distance Vector, routing load balancing, node caching, performance evaluation, mobile ad hoc networks, energy efficiency, routing protocols, network simulations
22Lixin Wang, Mounir Hamdi HAMAC: An Adaptive Channel Access Protocol for Multimedia Wireless Networks. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF multimedia wireless networks, performance evaluation, Multiple access protocols
22Jen-Yeu Chen, Gopal Pandurangan Optimal gossip-based aggregate computation. Search on Bibsonomy SPAA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distributed randomized protocols, lower bounds, probabilistic analysis, gossip-based protocols, aggregate computation
22Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
22Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey Determining a parallel session attack on a key distribution protocol using a model checker. Search on Bibsonomy MoMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attacks on security protocols, formal analysis of security protocols, parallel session attack, model checking
22Abhijit Saha, Shafqat Ur Rehman, Mikyung Kang, In-Hye Shin, Gyung-Leen Park, Junghoon Lee A Comparative Study of Directional Node-Disjoint Multipath Routing in Wireless Ad Hoc Network. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Unipath and Multipath Routing Protocols, Ad hoc Network, Wireless Network, Routing Protocols
22Márk Jelasity, Spyros Voulgaris, Rachid Guerraoui, Anne-Marie Kermarrec, Maarten van Steen Gossip-based peer sampling. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF peer sampling service, Gossip-based protocols, epidemic protocols
22Zaichen Zhang, Victor O. K. Li Network-Supported Layered Multicast Transport Control for Streaming Media. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network-Supported Protocols, Internet, Multicast, Network Protocols, Streaming Media
22Nipoon Malhotra, Shrish Ranjan, Saurabh Bagchi LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization. Search on Bibsonomy SRDS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Recovery latency, Tree-based multicast protocols, Reliable multicast, Randomized protocols, Buffer utilization
22Christof Fetzer Enforcing synchronous system properties on top of timed systems. Search on Bibsonomy PRDC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF synchronous system properties, synchronous system model, missed deadline, performance evaluation, performance, computational complexity, complexity, protocols, protocols, fault tolerant computing, timed systems, omission failures, dependable distributed system
22Panagiotis Melas, Ed Zaluska Performance of Message-Passing Systems using a Zero-Copy Communication Protocol. Search on Bibsonomy IEEE PACT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF zero-copy protocols, BIP, communication models performance, latency, communication protocols, bandwidth, cluster of workstations, message-passing systems
22Charles E. Perkins Mobile-IP, Ad-Hoc Networking, and Nomadicity. Search on Bibsonomy COMPSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF laptop computers, laptop computers, application interfaces, callback service, Internet, Internet, ad-hoc networking, protocols, wireless LAN, wireless communications, routing protocols, local area networks, Internet Protocol, Mobile-IP, application program interfaces, service location, feature integration, nomadicity
22Yen-Min Huang, Chinya V. Ravishankar Designing an Agent Synthesis System for Cross-RPC Communication. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF agent synthesis system, cross-RPC communication, RPC protocols, large heterogeneous environment, RPC agents, RPC heterogeneities, agent development costs, cross-RPC performance, distributed systems, parallel programming, protocols, rapid prototyping, software prototyping, remote procedure calls, remote procedure call, telecommunications computing, transport layer, maintenance costs
21Jorge Arturo Cobb, Mohamed G. Gouda Flow theory. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF guaranteed performance protocols, rate reservation protocols, protocols, protocol verification
21Santosh S. Venkatesh The Science of Making ERORS: What Error Tolerance Implies for Capacity in Neural Networks. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF formal protocols, error protocols, densely interconnected neural network architecture, feedforward neural network configurations, neural networks, protocols, fault tolerant computing, neural nets, associative memory, content-addressable storage, error tolerance
21Bruno Ciciani, Daniel M. Dias, Philip S. Yu Analysis of Replication in Distributed Database Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF optimal replication, approximate analytical model, semi-optimistic protocols, transaction mix, distributed sites, available MIPS, performance evaluation, performance evaluation, protocols, delays, distributed databases, concurrency control, sensitivity analysis, response time, data replication, communications delay, overhead, distributed database systems, resource contention, concurrency control protocols, data contention
21Shundong Li, Daoshun Wang, Yiqi Dai Symmetric cryptographic protocols for extended millionaires' problem. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended millionaires’ problem, simulation paradigm, cryptography, secure multiparty computation, symmetric cryptography
21Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Shankar M. Banik, Logan P. Daigle, Tao-hsiang Chang Implementation and empirical evaluations of floor control protocols on PlanetLab network. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF floor control protocol, performance evaluation
Displaying result #401 - #500 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license