|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Peter A. Moldovyanu, E. Dernova, A. Kostina, Nick A. Moldovyan |
Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Information Fusion and Geographic Information Systems, Proceedings of the Fourth International Workshop, IF&GIS 2009, 17-20 May 2009, St. Petersburg, Russia, pp. 331-341, 2009, Springer, 978-3-642-00303-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Collective digital signature, multisignature schemes, Digital signature, Public key, Finite group, Discrete logarithm problem |
21 | Matthew Small, Xin Yuan 0001 |
Maximizing MPI point-to-point communication performance on RDMA-enabled clusters with customized protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 23rd international conference on Supercomputing, 2009, Yorktown Heights, NY, USA, June 8-12, 2009, pp. 306-315, 2009, ACM, 978-1-60558-498-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rendezvous protocol, mpi, rdma |
21 | Al-Abbass Y. Al-Habashneh, Mohamed Hossam Ahmed, Tahir Husain |
Adaptive MAC protocols for forest fire detection using Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, CCECE 2009, 3-6 May 2009, Delta St. John's Hotel and Conference Centre, St. John's, Newfoundland, Canada, pp. 329-333, 2009, IEEE, 978-1-4244-3508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini |
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 321-336, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Rajiv Ramdhany, Paul Grace, Geoff Coulson, David Hutchison 0001 |
MANETKit: Supporting the Dynamic Deployment and Reconfiguration of Ad-Hoc Routing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30 - December 4, 2009. Proceedings, pp. 1-20, 2009, Springer, 978-3-642-10444-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
protocol frameworks, Ad-hoc routing |
21 | Weizhao Wang, Xiang-Yang Li 0001, Yu Wang 0003, Zheng Sun |
Designing Multicast Protocols for Non-Cooperative Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 26(7), pp. 1238-1249, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jie Feng 0005, Lisong Xu |
On the Time Scale of TCP-Friendly Admission Control Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 45-51, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Volkan Rodoplu, Amir Aminzadeh Gohari |
Challenges: automated design of networking protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14-19, 2008, pp. 271-278, 2008, ACM, 978-1-60558-096-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
automation, network protocol, mac |
21 | Bhavani Shankar, Kannan Srinathan, C. Pandu Rangan |
Alternative Protocols for Generalized Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008., pp. 304-309, 2008, Springer, 978-3-540-77443-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Yang Xu 0021, Xiaoyao Xie |
Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2079-2084, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Shan-Hung Wu, Ming-Syan Chen, Chung-Min Chen |
Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 785-792, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Huawei Zhao, Jing Qin 0002, Zhifeng Fang |
Converters for Designing Applied Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 139-143, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Anahit Martirosyan, Azzedine Boukerche, Richard Werner Nelem Pazzi |
A Taxonomy of Cluster-Based Routing Protocols for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 9th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2008, 7-9 May 2008, Sydney, NSW, Australia, pp. 247-253, 2008, IEEE Computer Society, 978-0-7695-3125-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
wireless sensor networks, energy-efficiency, cluster-based routing |
21 | Detlef Kähler, Ralf Küsters, Tomasz Truderung |
Infinite State AMC-Model Checking for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 10-12 July 2007, Wroclaw, Poland, Proceedings, pp. 181-192, 2007, IEEE Computer Society, 0-7695-2908-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Min Song 0002, Jun Wang 0016, Qun Hao |
Broadcasting Protocols for Multi-Radio Multi-Channel and Multi-Rate Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 3604-3609, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Qi Duan, Mohit Virendra, Shambhu J. Upadhyaya |
On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 4925-4930, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Orhan Cetinkaya, Ali Doganaksoy |
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1190-1196, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Luis Zarza, Josep Pegueroles, Miguel Soriano |
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1207-1213, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Anders Moen Hagalisletto |
Validating Attacks on Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 481-488, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Torsten Braun |
Tutorial 2: Communication Protocols in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah |
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 951-960, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol |
21 | Sarah Damiani, Christopher Griffin 0001, Shashi Phoha, Stephen A. Racunas, Christopher Rogan |
Verification of Secure Network Protocols in Uncertain Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Inf. Networks ![In: Int. J. Wirel. Inf. Networks 13(3), pp. 221-228, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
pushdown machine, Protocol verification, discrete event control |
21 | Stavros Toumpis, Andrea J. Goldsmith |
New media access protocols for wireless ad hoc networks based on cross-layer principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 5(8), pp. 2228-2241, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ran Canetti, Jonathan Herzog |
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 380-403, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Zhihua Tao, Gongyi Wu |
An analytical study on routing overhead of two-level cluster-based routing protocols for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Senem Velipasalar, Chang Hong Lin, Jason Schlessman, Wayne H. Wolf |
Design and Verification of Communication Protocols for Peer-to-Peer Multimedia Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1421-1424, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Weijia Wang, Lei Hu |
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 118-132, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
password, key distribution, authenticated key exchange, multi-party protocol |
21 | Ashok U. Mallya, Munindar P. Singh |
Introducing Preferences into Commitment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AC ![In: Agent Communication II, International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005 and Hakodate, Japan, May 9, 2006, Selected and Revised Papers, pp. 136-149, 2006, Springer, 978-3-540-68142-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jiangtao Li 0001, Ninghui Li |
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 122-138, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nael B. Abu-Ghazaleh |
Controlling the Coverage of Grid Information Dissemination Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 27-29 July 2005, Cambridge, MA, USA, pp. 267-270, 2005, IEEE Computer Society, 0-7695-2326-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Edith Elkind, Helger Lipmaa |
Hybrid Voting Protocols and Hardness of Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 16th International Symposium, ISAAC 2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings, pp. 206-215, 2005, Springer, 3-540-30935-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Saad Biaz, Richard O. Chapman, James Pate Williams |
RTP and TCP based MIDI over IP protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 112-117, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MIDI over IP, TCP, RTP, MIDI |
21 | Kyungsan Cho, Soo-Young Lee, JongEun Kim |
Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICESS ![In: Embedded Software and Systems, Second International Conference, ICESS 2005, Xi'an, China, December 16-18, 2005, Proceedings, pp. 638-649, 2005, Springer, 3-540-30881-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao |
Practical Zero-Knowledge Arguments from Sigma-Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 288-298, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Thomas Groß 0001, Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Browser Model for Security Analysis of Browser-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 489-508, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ashok U. Mallya, Munindar P. Singh |
Incorporating Commitment Protocols into Tropos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSE ![In: Agent-Oriented Software Engineering VI, 6th International Workshop, AOSE 2005, Utrecht, The Netherlands, July 25, 2005. Revised and Invited Papers, pp. 69-80, 2005, Springer, 3-540-34097-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Karim Seada, Ahmed Helmy, Sandeep Gupta 0001 |
A framework for systematic evaluation of multicast congestion control protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 22(10), pp. 2048-2061, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Pinar Yolum |
Correctness Requirements for Multiagent Commitment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings, pp. 955-965, 2004, Springer, 3-540-23526-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Zhiguo Wan, Shuhong Wang 0001 |
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 164-175, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mohamed Mejri |
Chaotic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 938-948, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Jichiang Tsai 0001 |
Systematic Comparisons of RDT Communication-Induced Checkpointing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti, pp. 66-75, 2004, IEEE Computer Society, 0-7695-2076-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Liqun Chen 0002, Caroline Kudla |
Identity Based Authenticated Key Agreement Protocols from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 219-233, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic |
A Derivation System for Security Protocols and its Logical Formalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 109-125, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Kwan-Wu Chin, John Judge, Aidan Williams, Roger G. Kermode |
Implementation experience with MANET routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 32(5), pp. 49-59, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | E. N. Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson 0001 |
A survey of rollback-recovery protocols in message-passing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 34(3), pp. 375-408, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
rollback-recovery, message logging |
21 | Christopher L. Barrett, Achla Marathe, Madhav V. Marathe, Martin Drozda |
Characterizing the interaction between routing and MAC protocols in ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 3rd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2002, June 9-11, 2002, Lausanne, Switzerland, pp. 92-103, 2002, ACM, 1-58113-501-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
ad hoc networks, performance analysis, statistical analysis |
21 | Hakima Chaouchi, Guy Pujolle, Hossam Afifi, Hahnsang Kim |
A trial towards unifying control protocols: COPS versus Radius/DIAMETER and Mobile IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, MWCN 2002, September 9-11, 2002, Stockholm, Sweden, pp. 537-541, 2002, IEEE. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Matthew Andrews, Baruch Awerbuch, Antonio Fernández 0001, Frank Thomson Leighton, Zhiyong Liu, Jon M. Kleinberg |
Universal-stability results and performance bounds for greedy contention-resolution protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 48(1), pp. 39-69, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
adversarial queuing theory, packet scheduling, end-to-end delay, network stability |
21 | Dawn Xiaodong Song, Adrian Perrig, Doantam Phan |
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAV ![In: Computer Aided Verification, 13th International Conference, CAV 2001, Paris, France, July 18-22, 2001, Proceedings, pp. 241-245, 2001, Springer, 3-540-42345-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Tadashige Iwao, Yuji Wada, Makoto Okada, Makoto Amamiya |
A Framework for the Exchange and Installation of Protocols in a Multi-agent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents V, 5th International Workshop, CIA 2001, Modena, Italy, September 6-8, 2001, Proceedings, pp. 211-222, 2001, Springer, 3-540-42545-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Ajay Chandra V. Gummalla, John O. Limb |
Effect of Turn-Around Times on the Performance of High Speed Ad-hoc MAC Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2000, Broadband Communications, High Performance Networking, and Performance of Communication Networks, IFIP-TC6 / European Commission International Conference, Paris, France, May 14-19, 2000, Proceedings, pp. 507-517, 2000, Springer, 3-540-67506-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Satish Chandra 0001, Brad Richards, James R. Larus |
Teapot: A Domain-Specific Language for Writing Cache Coherence Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 25(3), pp. 317-333, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
distributed systems, verification, Domain-specific languages, continuations, cache coherence |
21 | Jyh-Cheng Chen, Krishna M. Sivalingam, Prathima Agrawal |
Performance comparison of battery power consumption in wireless multiple access protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 5(6), pp. 445-460, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Seungwon Lee, Seong-Min Hong 0001, Hyunsoo Yoon, Yookun Cho |
Accelerating Key Establishment Protocols for Mobile Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 51-63, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Feng Bao 0001, Robert H. Deng, Wenbo Mao |
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings, pp. 77-85, 1998, IEEE Computer Society, 0-8186-8386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Thomas S. Jones, Ahmed Louri |
Media Access Protocols For A Scalable Optical Interconnection Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 1998 International Conference on Parallel Processing (ICPP '98), 10-14 August 1998, Minneapolis, Minnesota, USA, Proceedings, pp. 304-312, 1998, IEEE Computer Society, 0-8186-8650-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Chane L. Fullmer, J. J. Garcia-Luna-Aceves |
Solutions to Hidden Terminal Problems in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, September 14-18, 1997, Cannes, France., pp. 39-49, 1997, ACM, 0-89791-905-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Stefek Zaba |
E-Commerce Payment Protocols: Requirements and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 78-, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
21 | Colin Boyd, Wenbo Mao |
Design and Analysis of Key Exchange Protocols via Secure Channel Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 171-181, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Paul C. van Oorschot |
Extending Cryptographic Logics of Belief to Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 232-243, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Matti A. Hiltunen, Richard D. Schlichting |
Modularizing fault-tolerant protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992, Mont Saint-Michel, France, September 21-23, 1992, 1992, ACM. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Ronald V. Book, Friedrich Otto |
The Verifiability of Two-Party Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 254-260, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
21 | Richard T. B. Ma, Vishal Misra, Dan Rubenstein |
An analysis of generalized slotted-Aloha protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(3), pp. 936-949, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Markovian decision, MAC protocols, Stackelberg game, Prisoner's Dilemma, slotted-Aloha, short-term fairness |
21 | Clément Hurlin |
Specifying and checking protocols of multithreaded classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 587-592, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
protocols, object-orientation, multithreading, design by contract |
21 | Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokhale |
Evaluating Transport Protocols for Real-Time Event Stream Processing Middleware and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I, pp. 614-633, 2009, Springer, 978-3-642-05147-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pub/Sub Middleware, Data Distribution Service, Metrics, Transport Protocols |
21 | Ahyoung Lee, Ilkyeun Ra, HwaSung Kim |
Performance study of ad hoc routing protocols with gossip-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009, 2009, SCS/ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
simulation, performance evaluation, ad hoc networks, routing protocols, gossiping |
21 | Mabroka Ali Mayouf, Zarina Shukur |
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Visual Informatics: Bridging Research and Practice, First International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, Malaysia, November 11-13, 2009, Proceedings, pp. 510-520, 2009, Springer, 978-3-642-05035-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
possible attacks, animation, active learning, cryptographic protocols, visual metaphor |
21 | Béla Genge, Piroska Haller |
Middleware for Automated Implementation of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESWC ![In: The Semantic Web: Research and Applications, 6th European Semantic Web Conference, ESWC 2009, Heraklion, Crete, Greece, May 31-June 4, 2009, Proceedings, pp. 476-490, 2009, Springer, 978-3-642-02120-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
automated execution, ontologies, Web services, Middleware, security protocols |
21 | Ricardo Bedin França, Leandro Buss Becker, Jean-Paul Bodeveix, Jean-Marie Farines, Mamoun Filali |
Towards Safe Design of Synchronous Bus Protocols in Event-B. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBMF ![In: Formal Methods: Foundations and Applications, 12th Brazilian Symposium on Formal Methods, SBMF 2009, Gramado, Brazil, August 19-21, 2009, Revised Selected Papers, pp. 170-185, 2009, Springer, 978-3-642-10451-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
synchronous systems, Event-B, parameterized systems, bus protocols |
21 | Nikolay Borissov, Simon Caton, Omer F. Rana, Aharon Levine |
Message Protocols for Provisioning and Usage of Computing Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECON ![In: Grid Economics and Business Models, 6th International Workshop, GECON 2009, Delft, The Netherlands, August 24, 2009. Proceedings, pp. 160-170, 2009, Springer, 978-3-642-03863-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Message protocols, Expressing Economic Preferences, SLA |
21 | Petr Svenda, Lukás Sekanina, Václav Matyás |
Evolutionary design of secrecy amplification protocols for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 225-236, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secrecy amplification protocols, wireless sensor networks, evolutionary algorithms, key establishment |
21 | Alessandro Armando, Luca Compagna |
SAT-based model-checking for security protocols analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(1), pp. 3-32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SAT-based model checking, Multi-set rewriting, Security protocols, Bounded model checking |
21 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying and implementing privacy-preserving cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(6), pp. 395-420, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability |
21 | Kitae Nahm, Ahmed Helmy, C.-C. Jay Kuo |
Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 7(4), pp. 458-469, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless communication, Network Protocols, Mobile communication systems |
21 | Helmut Seidl, Kumar Neeraj Verma |
Flat and one-variable clauses: Complexity of verifying cryptographic protocols with single blind copying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Log. ![In: ACM Trans. Comput. Log. 9(4), pp. 28:1-28:45, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
instantiation-based theorem proving, Cryptographic protocols, first-order logic, resolution, Horn clauses |
21 | Seung Hwan Ryu, Fabio Casati, Halvard Skogsrud, Boualem Benatallah, Régis Saint-Paul |
Supporting the dynamic evolution of Web service protocols in service-oriented architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 2(2), pp. 13:1-13:46, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ongoing instances, Web services, decision trees, change impact analysis, Business protocols, dynamic evolution |
21 | Pau Arce, Juan Carlos Guerri, Ana Pajares, Óscar Lázaro |
Performance Evaluation of Video Streaming Over Ad Hoc Networks Using Flat and Hierarchical Routing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 13(3-4), pp. 324-336, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance, ad hoc networks, routing protocols, video streaming |
21 | Djamel Benmerzoug, Fabrice Kordon, Mahmoud Boufaïda |
A Petri-Net Based Formalisation of Interaction Protocols Applied to Business Process Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAO! / EOMAS ![In: Advances in Enterprise Engineering I, 4th International Workshop CIAO! and 4th International Workshop EOMAS, held at CAiSE 2008, Montpellier, France, June 16-17, 2008. Proceedings, pp. 78-92, 2008, Springer, 978-3-540-68643-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multi-agent Systems, Coloured Petri Nets, Interaction Protocols, Business Processes Integration |
21 | Laurent Dairaine, Guillaume Jourjon, Emmanuel Lochin, Sebastien Ardon |
IREEL: remote experimentation with real protocols and applications over an emulated network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 39(2), pp. 92-96, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
quality of service, network, protocols, TCP/IP, emulation |
21 | Raquel Fernández, Ulle Endriss |
Abstract models for dialogue protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Log. Lang. Inf. ![In: J. Log. Lang. Inf. 16(2), pp. 121-140, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multiagent systems, Communication protocols, Theory of computation, Dialogue modelling |
21 | Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. Guttman, John D. Ramsdell |
Compiling cryptographic protocols for deployment on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 687-696, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CPPL, cryptographic protocols, HTTP, sessions |
21 | Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein |
Theoretical bounds on control-plane self-monitoring in routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2007, San Diego, California, USA, June 12-16, 2007, pp. 325-336, 2007, ACM, 978-1-59593-639-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rogue node, routing protocols, distance vector, misconfiguration |
21 | Pau Arce, Juan Carlos Guerri, Ana Pajares, Óscar Lázaro |
Performance evaluation of video streaming over ad-hoc networks using flat and hierarchical routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 19, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
videostreaming, performance, routing protocols, AdHoc networks |
21 | Bruce Spencer |
Assimilating ontological additions in convergent negotiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007, University of Minnesota, Minneapolis, MN, USA, August 19-22, 2007, pp. 135-140, 2007, ACM, 978-1-59593-700-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
convergent negotiation, negotiating agents, ontologies, negotiation protocols, assimilation |
21 | Nicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito |
Architecture and Models for Self-Adaptability of Transport Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 977-982, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Micro Protocols, Quality of Service, Transport Protocol, Self-adaptation, Decision model |
21 | Pinar Yolum, Munindar P. Singh |
Enacting protocols by commitment concession. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 27, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
communication, protocols, argumentation |
21 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson |
Verifying the SET Purchase Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 36(1-2), pp. 5-37, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
deductive verification, electronic commerce, security protocols, Isabelle, inductive definitions |
21 | Javier Fabra, Pedro Álvarez 0001, José A. Bañares, Joaquin Ezpeleta |
A Framework for the Development and Execution of Horizontal Protocols in Open BPM Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management ![In: Business Process Management, 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006, Proceedings, pp. 209-224, 2006, Springer, 3-540-38901-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SOA and Process Management, Horizontal protocols, Nets-within-Nets paradigm, Petri nets, Formal models in BPM |
21 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 48-62, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks |
21 | YoungJoon Byun, Beverly A. Sanders |
A pattern-based development methodology for communication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 1524-1528, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
design pattern, communication protocols, pattern language, development methodology, SPIN model checker |
21 | Sebastian Pavel, Jacques Noyé, Pascal Poizat, Jean-Claude Royer |
A Java Implementation of a Component Model with Explicit Symbolic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC@ETAPS ![In: Software Composition - 4th International Workshop, SC@ETAPS 2005, Edinburgh, UK, April 9, 2005, Revised Selected Papers, pp. 115-124, 2005, Springer, 3-540-28748-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Behavioural IDL, Explicit Protocols, Symbolic Transition Systems, Java, Controllers, Channels, CBSE |
21 | Alaaeddine Fellah, John Mullins |
Admissible Interference by Typing for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 123-135, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Admissible interference, Type systems, Process Algebra, Cryptographic Protocols, Security Properties |
21 | Madieyna Lamine Fall, Sylvain Delisle |
A software tool for the development of MAS communication protocols based on conversations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1117-1118, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MAS, software tools, communication protocols, conversations, development environments |
21 | Feng Zhou, Chunhong Chen, Dawei Jin, Chenling Huang, Hao Min |
Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2004 International Symposium on Low Power Electronics and Design, 2004, Newport Beach, California, USA, August 9-11, 2004, pp. 357-362, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anti-collision protocols, low power, radio-frequency identification |
21 | S. Subramaniam 0002, Ed Komp, Mohan Kannan, Gary J. Minden |
Building a Reliable Multicast Service Based on Composite Protocols for Active Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers, pp. 101-113, 2004, Springer, 978-3-540-71499-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
protocol components, composite protocols, composable services, Active networks |
21 | Jichiang Tsai 0001 |
On Properties of RDT Communication-Induced Checkpointing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(8), pp. 755-764, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
rollback-dependency trackability, communication-induced checkpointing protocols, fault tolerance, Distributed systems, rollback-recovery |
21 | Hongbin Zhou, Simon N. Foley |
Fast automatic synthesis of security protocols using backward search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 1-10, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
backward search, security protocols, automatic generation, belief logic |
21 | Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhang |
Research on Security Architecture and Protocols of Grid Computing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 529-535, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Grid Computing System, Security Abstract, Grid Security Protocols, Broker |
21 | Paul E. Dunne, Peter McBurney |
Optimal utterances in dialogue protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 608-615, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
argumentation and persuasion, dialogue protocols, locution selection, computational complexity, agent communication languages |
21 | Boris Koldehofe |
Buffer Management in Probabilistic Peer-to-Peer Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy, pp. 76-, 2003, IEEE Computer Society, 0-7695-1955-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
multipeer communication, evaluation, networking, gossiping, peer-to-peer communication, fault tolerant protocols, fault tolerant communication |
Displaying result #501 - #600 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|