The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (15) 1978-1979 (26) 1980 (15) 1981 (30) 1982 (50) 1983 (69) 1984 (75) 1985 (69) 1986 (140) 1987 (114) 1988 (147) 1989 (228) 1990 (235) 1991 (243) 1992 (294) 1993 (284) 1994 (326) 1995 (387) 1996 (415) 1997 (467) 1998 (536) 1999 (647) 2000 (850) 2001 (963) 2002 (1221) 2003 (1464) 2004 (1929) 2005 (2435) 2006 (2445) 2007 (2520) 2008 (2579) 2009 (1774) 2010 (994) 2011 (918) 2012 (804) 2013 (824) 2014 (787) 2015 (769) 2016 (799) 2017 (752) 2018 (767) 2019 (115)
Publication types (Num. hits)
article(7669) book(55) incollection(171) inproceedings(22178) phdthesis(358) proceedings(105)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25261 occurrences of 6008 keywords

Results
Found 30536 publication records. Showing 30536 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
61Sriram Rao, Lorenzo Alvisi, Harrick M. Vin The Cost of Recovery in Message Logging Protocols. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF log-based rollback recovery, pessimistic protocols, causal protocols, fault tolerance, Distributed computing, optimistic protocols, hybrid protocols
56Paul J. Fortier, John C. Sieg Jr. Simulation analysis of early commit concurrency control protocols. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF simulation analysis, early commit concurrency control protocols, concurrency control enforcement, atomic data sets, transaction writer, conventional locking, recovery protocols, merged-commit, databases, protocols, virtual machines, concurrency control, database management systems, transaction processing, database design, system recovery, simulation model, replay, optimistic protocols, protocols performance, timestamp ordering
54C. Admas, S. Lloyd Profiles and protocols for the Internet Public-Key Infrastructure. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Internet Public-Key Infrastructure, X.509 authentication framework, IETF PKIX working group, CRL profile, operational protocols, certificate management protocols, certificate policy, time stamp protocols, notrary protocols, Internet, protocols, standardization, certification, X.509 certificate
54Indranil Gupta On the design of distributed protocols from differential equations. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF endemic protocols, probabilistic protocols, science of protocol design, reliability, scalability, distributed protocols
52Alain Raynaud, Zheng Zhang, Josep Torrellas Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors. Search on Bibsonomy HPCA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF update protocols, cache coherence protocols, scalable shared-memory multiprocessors
51Yu-Kwong Kwok, Vincent K. N. Lau A Performance Study of Multiple Access Control Protocols for Wireless Multimedia Services. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF integrated voice/data communication, packet reservation multiple access, multiple access control protocols, wireless multimedia services, broadband wireless multimedia network, user traffic requirements, channel bandwidth allocation, TDMA-based MAC protocols, integrated wireless data/voice services, SCAMA, DTDMA/VR, DTDMA/PR, D4RUMA, DPRMA, DSA++, PRMA/DA, orthogonal design, quality of service, quality of service, performance, asynchronous transfer mode, multimedia communication, time division multiple access, MAC protocol, telecommunication traffic, access protocols, protocol designs, CBR, VBR, broadband networks, packet radio networks, ABR, wireless ATM network
49Phan Minh Dung, Phan Minh Thang Stepwise development of security protocols: a speech act-oriented approach. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security protocols, cryptographic protocols
49Shu Chen, Yingying Chen 0001, Wade Trappe Exploiting environmental properties for wireless localization. Search on Bibsonomy Mobile Computing and Communications Review The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy Mobile Computing and Communications Review The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Gurdip Singh Constraint-based Structuring of Network Protocols. Search on Bibsonomy Distributed Computing The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Multifunction protocols, Safety and liveness properties, Distributed protocols, Protocol composition
45Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
45Michael Hitchens, Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos
45Tim Miller, Peter McBurney On illegal composition of first-class agent interaction protocols. Search on Bibsonomy ACSC The full citation details ... 2008 DBLP  BibTeX  RDF multi-agent systems, interaction protocols
44Kamil Kulesza, Zbigniew Kotulski Addressing New Challenges by Building Security Protocols Around Graphs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF extended capabilities, graph theory, quantum computing, security protocols, secret sharing, data security, graph colouring
44Efstratios Thomopoulos, Louise E. Moser, P. M. Melliar-Smith Analyzing the latency of the Totem multicast protocols. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Totem multicast protocols, multicast group communication protocols, latency analysis, reliable totally ordered delivery, logical token-passing ring, single-ring network, two-ring network, four-ring network, multiple-ring networks, mean latency, latency distribution, distributed systems, protocols, local area networks, LAN, probability density functions, gateways, protocols performance, message delivery, message filtering
44Supakorn Kungpisdan, Yongyuth Permpoontanalarp Practical Reasoning about Accountability in Electronic Commerce Protocols. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Formal methods for security protocols, analysis of electronic commerce protocols
44Norman C. Hutchinson, Larry L. Peterson The x-Kernel: An Architecture for Implementing Network Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF x-Kernel, architecture, protocols, interface, network protocols, network operating systems, operating system kernel
44Dongyao Ji, Yuming Wang Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. Search on Bibsonomy Operating Systems Review The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43David C. Roberts, David A. Grossman, Ophir Frieder, R. Bernstein, E. Bisfiop Performance testing of communication protocols for three-tier computing: results for ICA and X window protocols. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF three-tier computing, ICA protocols, X window protocols, Windows NT operating system, data server, stored databases, Tier 1, Tier 2, client program, desktop machines, Tier 3, intelligence computer architecture, Microsoft Office 97, Lotus Notes applications, user interface, data compression, data compression, communication protocols, network traffic, application server, performance testing, network bandwidth, multi-user environment
42Ashok U. Mallya, Munindar P. Singh An algebra for commitment protocols. Search on Bibsonomy Autonomous Agents and Multi-Agent Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multiagent system modelling and design, Formal methods, Commitments, Interaction Protocols
41Liqun Chen, Hoon Wei Lim, Wenbo Mao User-Friendly Grid Security Architecture and Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security
41Indranil Gupta, Mahvesh Nagda, Christo Frank Devaraj The design of novel distributed protocols from differential equations. Search on Bibsonomy Distributed Computing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Science of protocol design, Endemics, LV, Probabilistic protocols, Reliability, Scalability, Replication, Voting, Differential equations, Distributed protocols
40LihChyun Shu, Michal Young Chopping and versioning real-time transactions to avoid remote blocking. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF real time transaction versioning, remote blocking, versioning protocols, chopping analysis, pure locking protocols, 1-version serializability, design time information, simple data structures, small bounded overheads, worst case access times, scheduling, real-time systems, protocols, concurrency control, multiprocessors, multiprocessing systems, transaction processing, configuration management, schedulability analysis, hard real time systems, critical sections, locking protocols, database concurrency control
40Beng-Hong Lim, Anant Agarwal Reactive Synchronization Algorithms for Multiprocessors. Search on Bibsonomy ASPLOS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
40Birgit Pfitzmann Federated Identity-Management Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin Verifying The Correctness Of Cryptographic Protocols Using "Convince". Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support
39Daniel A. Menascé, Yelena Yesha, Konstantinos Kalpakis On a Unified Framework for the Evaluation of Distributed Quorum Attainment Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF distributed quorum attainment protocols, unified analytical model, Majority Consensus algorithms, primary site approach, parallel version, tree-based mutual exclusion protocols, fault tolerance, performability, distributed systems, performance analysis, protocols, distributed algorithms, software performance evaluation, software fault tolerance, performability metric, network delay, unified framework, protocol performance, delay analysis, mutual exclusion algorithms
39Huafei Zhu Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols
39Volker Roth 0002 On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF breaking security protocols, cryptanalysis, mobile agent security
39Lorenzo Alvisi, Keith Marzullo Message Logging: Pessimistic, Optimistic, Causal, and Optimal. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF pessimistic protocols, checkpoint-restart protocols, resilient processes, specification of fault-tolerance techniques, Message logging, optimistic protocols
39Xin Yuan 0001, Rami G. Melhem, Rajiv Gupta 0001 Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks. Search on Bibsonomy HPCA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF distributed path reservation algorithms, multiplexed all-optical interconnection networks, distributed path reservation protocols, forward reservation protocols, backward reservation protocols, 2-dimensional torus interconnection networks, wavelength division multiplexing, communication delay, time division multiplexing, time division multiplexing
38Brian Neil Levine, J. J. Garcia-Luna-Aceves A Comparison of Known Classes of Reliable Multicast Protocols. Search on Bibsonomy ICNP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Ashok U. Mallya, Munindar P. Singh A Semantic Approach for Designing Commitment Protocols. Search on Bibsonomy AC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38E. Allen Emerson, Vineet Kahlon Exact and Efficient Verification of Parameterized Cache Coherence Protocols. Search on Bibsonomy CHARME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Amos Beimel, Yoav Stahl Robust Information-Theoretic Private Information Retrieval. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Simon N. Foley, Hongbin Zhou Towards a Framework for Autonomic Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Simon N. Foley Towards a Framework for Autonomic Security Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Alec Yasinsac, James A. Davis Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Ching-Hua Chow, Simon S. Lam PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF communication protocols verification, PROSPEC, interactive programming environment, fair reachability analysis, multiphase construction, protocol projection, BSC, X.21, X.25, Telnet document transfer protocols, protocols, specification, software tools, programming environments, graphical interface, interactive programming
36Deger Cenk Erdil, Michael J. Lewis Gossiping protocols for hybrid grid resource scheduling. Search on Bibsonomy Peer-to-Peer Networking and Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grid resource scheduling, Epidemic gossiping, Pairwise gossiping, Information dissemination, Gossiping protocols
36Rajashekar Kailar Accountability in Electronic Commerce Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF electronic commerce, logic, cryptographic protocols, Accountability, formal analysis, protocol analysis
36Colin Boyd, Wenbo Mao Designing Secure Key Exchange Protocols. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF authentication, key management, Cryptographic protocols
36Kurt Rothermel, Stefan Pappe Open Commit Protocols Tolerating Commission Failures. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF open systems, commit protocols
36Lansing Sloan Mechanisms that Enforce Bounds on Packet Lifetimes Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF internetwork gateways, maximum packet lifetime, network-layer protocols, three-way handshake, timer-based protocols, transit-time protocols, transport protocols, packet switching, link-layer protocols, subnetworks
36Steven Y. Ko, Indranil Gupta, Yookyung Jo A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing. Search on Bibsonomy TAAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF autonomic computing and communication, bio-inspired techniques, probabilistic protocols, sequence equations, sequence protocols, adaptivity, grid computing, convergence, design methodology, distributed protocols, Complex adaptive systems, difference equations
36Chih-Hung Li, Josef Pieprzyk Conference Key Agreement from Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols
35John Spinelli Self-stabilizing sliding window ARQ protocols. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ARQ protocols, computer network protocols, self-stabilizing protocols, protocols
35Mostafa A. Bassiouni Single-Site and Distributed Optimistic Protocols for Concurrency Control. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF single site protocols, single site networks, lock maintenance, deadlock handling, protocols, distributed databases, distributed databases, concurrency control, computer networks, database management system, system recovery, distributed networks, distributed protocols, time-stamps, performance enhancement, optimistic protocols, synchronization methods
35Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dimitrios D. Vergados Energy-efficient routing protocols in wireless sensor networks for health communication systems. Search on Bibsonomy PETRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF flat networks protocols, wireless sensor networks, routing protocols, sensor nodes
35Stephen Keung, Kai-Yeung Siu Efficient protocols secure against guessing and replay attacks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks
35Matthias Krause 0001, Dirk Stegemann More on the Security of Linear RFID Authentication Protocols. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography
35Tim Miller, Peter McBurney Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols. Search on Bibsonomy ESAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Fernando Pedone Boosting System Performance with Optimistic Distributed Protocols. Search on Bibsonomy IEEE Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Constantine Coutras, Peng-Jun Wan, Ophir Frieder Analytical Modeling and Performance Evaluation of the HIPERLAN CAC Layer Protocol for Real-Time Traffic. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF HIPERLAN CAC layer protocol, wireless LAN protocols, WLAN protocols, MAC layer protocols, radio equipment, radio systems, European Telecommunications Standards Institute, high performance radio LAN, channel access control layer, simulation, performance evaluation, performance evaluation, real-time systems, wireless networks, wireless LAN, medium access control, analytical modeling, telecommunication traffic, personal computers, access protocols, wireless systems, telecommunication congestion control, telecommunication standards, real-time traffic, packet radio networks, land mobile radio
34Azzedine Boukerche, Khalil El-Khatib, Tingxue Huang A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wireless networks, mutual exclusion, dynamic channel allocation
34Birgit Pfitzmann, Michael Waidner Federated Identity-Management Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Roger M. Needham Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Peter Landrock Interactive Identification Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Peter Landrock A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey. Search on Bibsonomy MACE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF aggregation protocols, Peer-to-Peer decentralized monitoring, tree-based protocols, gossip-based protocols
34Andrew A. Hanish, Tharam S. Dillon Object-oriented modelling of communication protocols for re-use. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF industrial implementations, reuseable software modules, reuseable model elements, message sequence encoding, protocol entities, ISO/OSI Reference Model, generalised model, interlayer communication model, modified TTCN notation, Petri nets, protocols, communication protocols, networking protocols, object-oriented modelling, formal descriptions, protocol implementation, alternating bit protocol
34Tim Miller, Peter McBurney Annotation and Matching of First-Class Agent Interaction Protocols. Search on Bibsonomy ArgMAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF first-class protocols, multi-agent systems, annotation, matching, agent interaction
34Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Peer-to-peer (P2P) systems, mutual anonymity, overlay networks, communication protocols, Internet systems
33Bruce Christianson, Michael Roe, David Wheeler Secure Sessions from Weak Secrets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano Making Sense of Specifications: The Formalization of SET. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Alper Kanak, Öznur Özkasap Transport Protocol Mechanisms for Wireless Networking: A Review and Comparative Simulation Study. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF wireless transport protocols, split-connection protocols, wired-cum-wireless, TCP, end-to-end protocols
33Dieter Gollmann What do We Mean by Entity Authentication? Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication
32Teunis Ott Transport Protocols in the TCP Paradigm and their Performance. Search on Bibsonomy Telecommunication Systems The full citation details ... 2005 DBLP  DOI  BibTeX  RDF performance of transport protocols, Internet, performance, TCP, transport protocols, protocol analysis
32Lívia M. R. Sampaio, Francisco Vilar Brasileiro, André L. C. Moreira Performance Analysis of Adaptive Consensus Protocols Based on Slowness Oracles. Search on Bibsonomy ICDCS Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF adaptive distributed protocols, slowness oracles, asynchronous distributed systems, unreliable failure detectors, consensus protocols
32Olivier Markowitch, Dieter Gollmann, Steve Kremer On Fairness in Exchange Protocols. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF exchange protocols, fairness, security protocols, fair exchange, security properties
32W. Timothy Strayer A Class-Chest for Deriving Transport Protocols. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF class-chest, protocol algorithms, prebuilt infrastructure, Meta-Transport Library, C++ base classes library, Unix environment, rapid prototyping, transport protocols, transport protocols, protocol implementations
32David W. Pritty, Duncan N. Smeed, Norman L. Lawrie A new class of high speed LAN access protocols based on the principle of timed packet release. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF timed packet release, high speed local area network, bus structures, TPR, performance evaluation, performance, discrete event simulation, discrete event simulation, local area networks, access protocols, access protocols, comparative evaluation, high speed LAN
32Li Gong Optimal authentication protocols resistant to password guessing attacks. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks
32Bruno Ciciani, Daniel M. Dias, Philip S. Yu Analysis of Concurrency-Coherency Control Protocols for Distributed Transaction Processing Systems with Regional Locality. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF concurrency-coherency control protocols, distributed transaction processing systems, fully replicated databases, duplicate copies, approximate analytic model, performance evaluation, performance, databases, protocols, delay, distributed processing, distributed databases, concurrency control, transaction processing
32Naftaly H. Minsky The Imposition of Protocols Over Open Distributed Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF enforced specification, online distributed updating, global law, protocols, protocols, distributed processing, open distributed systems
32Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Shahzad A. Malik An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF end-to-end solutions, service disruption time, performance analysis, TCP, mobility management
32Tri Pham, Eun Jik Kim, W. Melody Moh On Data Aggregation Quality and Energy Efficiency of Wireless Sensor Network Protocols - Extended Summary. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Ryan G. Lane, Scott Daniels, Xin Yuan An Empirical Study of Reliable Multicast Protocols over Ethernet - Connected Networks. Search on Bibsonomy ICPP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Fred Kuhns, Carlos O'Ryan, Douglas C. Schmidt, Ossama Othman, Jeff Parsons The Design and Performance of a Pluggable Protocols Framework for CORBA Middleware. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 1999 DBLP  BibTeX  RDF
32Murray W. Goldberg, Gerald W. Neufeld, Mabo Robert Ito A Parallel Approach to OSI Connection-Oriented Protocols. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 1992 DBLP  BibTeX  RDF
31Ran Canetti, Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security
31Tao Cui, Feifei Gao, Tracey Ho, Arumugam Nallanathan Distributed Space-Time Coding for Two-Way Wireless Relay Networks. Search on Bibsonomy IEEE Trans. Signal Processing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Peter Triantafillou Independent Recovery in Large-Scale Distributed Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF blocking atomic commitment, independent recovery, distributed computing, concurrency control, replication, Availability, transactions, crash recovery
31Francis Y. L. Chin, K. V. S. Ramarao Optimal Termination Prococols for Network Partitioning. Search on Bibsonomy PODS The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
31João L. Sobrinho Network routing with path vector protocols: theory and applications. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF path vector protocols, BGP, border gateway protocol, algebra
31Mike Bond, George Danezis The Dining Freemasons (Security Protocols for Secret Societies). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Richard Clayton Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Mike Bond The Dining Freemasons (Security Protocols for Secret Societies). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Geraint Price Client v. Server Side Protocols, Interfaces and Storage (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31N. Asokan Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati Towards Flexible Credential Negotiation Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson Is the Verification Problem for Cryptographic Protocols Solved?. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Brian Monahan From Security Protocols to Systems Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Colin Boyd, Wenbo Mao, Kenneth G. Paterson Deniable Authenticated Key Establishment for Internet Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Chris Blondia, Olga Casals, Peter De Cleyn, Gert Willems Performance Analysis of IP Micro-mobility Handoff Protocols. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Ricardo Bianchini, Leonidas I. Kontothanassis Algorithms for categorizing multiprocessor communication under invalidate and update-based coherence protocols. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF shared-memory multiprocessor communication, invalidate-based cache coherence protocols, update-based cache coherence protocols, reference patterns, sharing patterns, useless data traffic, data traffic categorization, parallel programming, parallel programs, virtual machines, transaction processing, shared memory systems, coherence, cache storage, telecommunication traffic, cache misses, simulation algorithms, update transactions, memory protocols
31Deepinder P. Sidhu, Juan Aristizabal Constructing Submodule Specifications and Network Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF submodule specifications, module specification, formal specification, formal specification, protocols, software tools, finite-state machine, communication protocols, network protocols, finite automata, automated tool, execution sequences
31Jie Feng, Derek L. Eager, Dwight J. Makaroff Aggregation Protocols for High Rate, Low Delay Data Collection in Sensor Networks. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF aggregation protocols, performance evaluation, sensor networks
31Ralf Küsters, Max Tuengerthal Computational soundness for key exchange protocols with symmetric encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF simulation-based security, cryptographic protocols, computational soundness
31Ton van Deursen, Sasa Radomirovic Algebraic Attacks on RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Formal verification, security protocols, attacks, algebraic methods
Displaying result #1 - #100 of 30536 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license