|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
57 | Sriram Rao, Lorenzo Alvisi, Harrick M. Vin |
The Cost of Recovery in Message Logging Protocols. |
IEEE Trans. Knowl. Data Eng. |
2000 |
DBLP DOI BibTeX RDF |
log-based rollback recovery, pessimistic protocols, causal protocols, fault tolerance, Distributed computing, optimistic protocols, hybrid protocols |
55 | Paul J. Fortier, John C. Sieg Jr. |
Simulation analysis of early commit concurrency control protocols. |
Annual Simulation Symposium |
1995 |
DBLP DOI BibTeX RDF |
simulation analysis, early commit concurrency control protocols, concurrency control enforcement, atomic data sets, transaction writer, conventional locking, recovery protocols, merged-commit, databases, protocols, virtual machines, concurrency control, database management systems, transaction processing, database design, system recovery, simulation model, replay, optimistic protocols, protocols performance, timestamp ordering |
52 | Carlisle Adams, Steve Lloyd |
Profiles and protocols for the Internet Public-Key Infrastructure. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
Internet Public-Key Infrastructure, X.509 authentication framework, IETF PKIX working group, CRL profile, operational protocols, certificate management protocols, certificate policy, time stamp protocols, notrary protocols, Internet, protocols, standardization, certification, X.509 certificate |
50 | Indranil Gupta |
On the design of distributed protocols from differential equations. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
endemic protocols, probabilistic protocols, science of protocol design, reliability, scalability, distributed protocols |
49 | Yu-Kwong Kwok, Vincent K. N. Lau |
A Performance Study of Multiple Access Control Protocols for Wireless Multimedia Services. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
integrated voice/data communication, packet reservation multiple access, multiple access control protocols, wireless multimedia services, broadband wireless multimedia network, user traffic requirements, channel bandwidth allocation, TDMA-based MAC protocols, integrated wireless data/voice services, SCAMA, DTDMA/VR, DTDMA/PR, D4RUMA, DPRMA, DSA++, PRMA/DA, orthogonal design, quality of service, quality of service, performance, asynchronous transfer mode, multimedia communication, time division multiple access, MAC protocol, telecommunication traffic, access protocols, protocol designs, CBR, VBR, broadband networks, packet radio networks, ABR, wireless ATM network |
48 | Alain Raynaud, Zheng Zhang 0001, Josep Torrellas |
Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors. |
HPCA |
1996 |
DBLP DOI BibTeX RDF |
update protocols, cache coherence protocols, scalable shared-memory multiprocessors |
45 | Phan Minh Dung, Phan Minh Thang |
Stepwise development of security protocols: a speech act-oriented approach. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
security protocols, cryptographic protocols |
45 | Kamil Kulesza, Zbigniew Kotulski |
Addressing New Challenges by Building Security Protocols Around Graphs. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
extended capabilities, graph theory, quantum computing, security protocols, secret sharing, data security, graph colouring |
43 | Gurdip Singh |
Constraint-based Structuring of Network Protocols. |
Distributed Comput. |
1999 |
DBLP DOI BibTeX RDF |
Multifunction protocols, Safety and liveness properties, Distributed protocols, Protocol composition |
43 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
43 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
43 | Efstratios Thomopoulos, Louise E. Moser, P. M. Melliar-Smith |
Analyzing the latency of the Totem multicast protocols. |
ICCCN |
1997 |
DBLP DOI BibTeX RDF |
Totem multicast protocols, multicast group communication protocols, latency analysis, reliable totally ordered delivery, logical token-passing ring, single-ring network, two-ring network, four-ring network, multiple-ring networks, mean latency, latency distribution, distributed systems, protocols, local area networks, LAN, probability density functions, gateways, protocols performance, message delivery, message filtering |
42 | Liqun Chen 0002, Hoon Wei Lim, Wenbo Mao |
User-Friendly Grid Security Architecture and Protocols. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security |
42 | David C. Roberts, David A. Grossman, Ophir Frieder, Robert Bernstein, Eric Bisfiop |
Performance testing of communication protocols for three-tier computing: results for ICA and X window protocols. |
ICCCN |
1997 |
DBLP DOI BibTeX RDF |
three-tier computing, ICA protocols, X window protocols, Windows NT operating system, data server, stored databases, Tier 1, Tier 2, client program, desktop machines, Tier 3, intelligence computer architecture, Microsoft Office 97, Lotus Notes applications, user interface, data compression, data compression, communication protocols, network traffic, application server, performance testing, network bandwidth, multi-user environment |
42 | Shu Chen, Yingying Chen 0001, Wade Trappe |
Exploiting environmental properties for wireless localization. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee |
Alert propagation in mobile ad hoc networks. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Tim Miller 0001, Peter McBurney |
On illegal composition of first-class agent interaction protocols. |
ACSC |
2008 |
DBLP BibTeX RDF |
multi-agent systems, interaction protocols |
41 | Supakorn Kungpisdan, Yongyuth Permpoontanalarp |
Practical Reasoning about Accountability in Electronic Commerce Protocols. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Formal methods for security protocols, analysis of electronic commerce protocols |
41 | Norman C. Hutchinson, Larry L. Peterson |
The x-Kernel: An Architecture for Implementing Network Protocols. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
x-Kernel, architecture, protocols, interface, network protocols, network operating systems, operating system kernel |
40 | Birgit Pfitzmann |
Federated Identity-Management Protocols (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
39 | Dongyao Ji, Yuming Wang |
Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. |
ACM SIGOPS Oper. Syst. Rev. |
2001 |
DBLP DOI BibTeX RDF |
|
38 | LihChyun Shu, Michal Young |
Chopping and versioning real-time transactions to avoid remote blocking. |
RTCSA |
2000 |
DBLP DOI BibTeX RDF |
real time transaction versioning, remote blocking, versioning protocols, chopping analysis, pure locking protocols, 1-version serializability, design time information, simple data structures, small bounded overheads, worst case access times, scheduling, real-time systems, protocols, concurrency control, multiprocessors, multiprocessing systems, transaction processing, configuration management, schedulability analysis, hard real time systems, critical sections, locking protocols, database concurrency control |
38 | Ashok U. Mallya, Munindar P. Singh |
An algebra for commitment protocols. |
Auton. Agents Multi Agent Syst. |
2007 |
DBLP DOI BibTeX RDF |
Multiagent system modelling and design, Formal methods, Commitments, Interaction Protocols |
38 | Indranil Gupta, Mahvesh Nagda, Christo Frank Devaraj |
The design of novel distributed protocols from differential equations. |
Distributed Comput. |
2007 |
DBLP DOI BibTeX RDF |
Science of protocol design, Endemics, LV, Probabilistic protocols, Reliability, Scalability, Replication, Voting, Differential equations, Distributed protocols |
38 | Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
Verifying The Correctness Of Cryptographic Protocols Using "Convince". |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support |
38 | Daniel A. Menascé, Yelena Yesha, Konstantinos Kalpakis |
On a Unified Framework for the Evaluation of Distributed Quorum Attainment Protocols. |
IEEE Trans. Software Eng. |
1994 |
DBLP DOI BibTeX RDF |
distributed quorum attainment protocols, unified analytical model, Majority Consensus algorithms, primary site approach, parallel version, tree-based mutual exclusion protocols, fault tolerance, performability, distributed systems, performance analysis, protocols, distributed algorithms, software performance evaluation, software fault tolerance, performability metric, network delay, unified framework, protocol performance, delay analysis, mutual exclusion algorithms |
38 | Simon N. Foley, Hongbin Zhou |
Towards a Framework for Autonomic Security Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Simon N. Foley |
Towards a Framework for Autonomic Security Protocols (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Alec Yasinsac, James A. Davis |
Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Lorenzo Alvisi, Keith Marzullo |
Message Logging: Pessimistic, Optimistic, Causal, and Optimal. |
IEEE Trans. Software Eng. |
1998 |
DBLP DOI BibTeX RDF |
pessimistic protocols, checkpoint-restart protocols, resilient processes, specification of fault-tolerance techniques, Message logging, optimistic protocols |
36 | Xin Yuan 0001, Rami G. Melhem, Rajiv Gupta 0001 |
Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks. |
HPCA |
1997 |
DBLP DOI BibTeX RDF |
distributed path reservation algorithms, multiplexed all-optical interconnection networks, distributed path reservation protocols, forward reservation protocols, backward reservation protocols, 2-dimensional torus interconnection networks, wavelength division multiplexing, communication delay, time division multiplexing, time division multiplexing |
36 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
36 | Volker Roth 0002 |
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. |
Mobile Agents |
2001 |
DBLP DOI BibTeX RDF |
breaking security protocols, cryptanalysis, mobile agent security |
36 | Lansing Sloan |
Mechanisms that Enforce Bounds on Packet Lifetimes |
ACM Trans. Comput. Syst. |
1983 |
DBLP DOI BibTeX RDF |
internetwork gateways, maximum packet lifetime, network-layer protocols, three-way handshake, timer-based protocols, transit-time protocols, transport protocols, packet switching, link-layer protocols, subnetworks |
35 | Ching-Hua Chow, Simon S. Lam |
PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
communication protocols verification, PROSPEC, interactive programming environment, fair reachability analysis, multiphase construction, protocol projection, BSC, X.21, X.25, Telnet document transfer protocols, protocols, specification, software tools, programming environments, graphical interface, interactive programming |
35 | Brian Neil Levine, J. J. Garcia-Luna-Aceves |
A Comparison of Known Classes of Reliable Multicast Protocols. |
ICNP |
1996 |
DBLP DOI BibTeX RDF |
|
35 | John Spinelli |
Self-stabilizing sliding window ARQ protocols. |
IEEE/ACM Trans. Netw. |
1997 |
DBLP DOI BibTeX RDF |
ARQ protocols, computer network protocols, self-stabilizing protocols, protocols |
35 | Mostafa A. Bassiouni |
Single-Site and Distributed Optimistic Protocols for Concurrency Control. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
single site protocols, single site networks, lock maintenance, deadlock handling, protocols, distributed databases, distributed databases, concurrency control, computer networks, database management system, system recovery, distributed networks, distributed protocols, time-stamps, performance enhancement, optimistic protocols, synchronization methods |
35 | Azzedine Boukerche, Khalil El-Khatib, Tingxue Huang |
A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks. |
Mobility Management & Wireless Access Protocols |
2004 |
DBLP DOI BibTeX RDF |
wireless networks, mutual exclusion, dynamic channel allocation |
35 | Birgit Pfitzmann, Michael Waidner |
Federated Identity-Management Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Roger M. Needham |
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Peter Landrock |
Interactive Identification Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Peter Landrock |
A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Fred Kuhns, Carlos O'Ryan, Douglas C. Schmidt, Ossama Othman, Jeff Parsons |
The Design and Performance of a Pluggable Protocols Framework for CORBA Middleware. |
Protocols for High-Speed Networks |
1999 |
DBLP BibTeX RDF |
|
34 | Murray W. Goldberg, Gerald W. Neufeld, Mabo Robert Ito |
A Parallel Approach to OSI Connection-Oriented Protocols. |
Protocols for High-Speed Networks |
1992 |
DBLP BibTeX RDF |
|
34 | Beng-Hong Lim, Anant Agarwal |
Reactive Synchronization Algorithms for Multiprocessors. |
ASPLOS |
1994 |
DBLP DOI BibTeX RDF |
|
34 | Steven Y. Ko, Indranil Gupta, Yookyung Jo |
A new class of nature-inspired algorithms for self-adaptive peer-to-peer computing. |
ACM Trans. Auton. Adapt. Syst. |
2008 |
DBLP DOI BibTeX RDF |
autonomic computing and communication, bio-inspired techniques, probabilistic protocols, sequence equations, sequence protocols, adaptivity, grid computing, convergence, design methodology, distributed protocols, Complex adaptive systems, difference equations |
34 | Chih-Hung Li, Josef Pieprzyk |
Conference Key Agreement from Secret Sharing. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols |
34 | Ashok U. Mallya, Munindar P. Singh |
A Semantic Approach for Designing Commitment Protocols. |
AC |
2004 |
DBLP DOI BibTeX RDF |
|
34 | E. Allen Emerson, Vineet Kahlon |
Exact and Efficient Verification of Parameterized Cache Coherence Protocols. |
CHARME |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Constantine Coutras, Peng-Jun Wan, Ophir Frieder |
Analytical Modeling and Performance Evaluation of the HIPERLAN CAC Layer Protocol for Real-Time Traffic. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
HIPERLAN CAC layer protocol, wireless LAN protocols, WLAN protocols, MAC layer protocols, radio equipment, radio systems, European Telecommunications Standards Institute, high performance radio LAN, channel access control layer, simulation, performance evaluation, performance evaluation, real-time systems, wireless networks, wireless LAN, medium access control, analytical modeling, telecommunication traffic, personal computers, access protocols, wireless systems, telecommunication congestion control, telecommunication standards, real-time traffic, packet radio networks, land mobile radio |
33 | Deger Cenk Erdil, Michael J. Lewis |
Gossiping protocols for hybrid grid resource scheduling. |
Peer-to-Peer Netw. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Grid resource scheduling, Epidemic gossiping, Pairwise gossiping, Information dissemination, Gossiping protocols |
33 | Rajashekar Kailar |
Accountability in Electronic Commerce Protocols. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
electronic commerce, logic, cryptographic protocols, Accountability, formal analysis, protocol analysis |
33 | Colin Boyd, Wenbo Mao |
Designing Secure Key Exchange Protocols. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
authentication, key management, Cryptographic protocols |
33 | Kurt Rothermel, Stefan Pappe |
Open Commit Protocols Tolerating Commission Failures. |
ACM Trans. Database Syst. |
1993 |
DBLP DOI BibTeX RDF |
open systems, commit protocols |
33 | Bruce Christianson, Michael Roe, David Wheeler |
Secure Sessions from Weak Secrets. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano |
Making Sense of Specifications: The Formalization of SET. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Nikolaos A. Pantazis, Stefanos A. Nikolidakis, Dimitrios D. Vergados |
Energy-efficient routing protocols in wireless sensor networks for health communication systems. |
PETRA |
2009 |
DBLP DOI BibTeX RDF |
flat networks protocols, wireless sensor networks, routing protocols, sensor nodes |
33 | Stephen Keung, Kai-Yeung Siu |
Efficient protocols secure against guessing and replay attacks. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks |
33 | Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, Dominique Gaïti |
Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey. |
MACE |
2009 |
DBLP DOI BibTeX RDF |
aggregation protocols, Peer-to-Peer decentralized monitoring, tree-based protocols, gossip-based protocols |
33 | Andrew A. Hanish, Tharam S. Dillon |
Object-oriented modelling of communication protocols for re-use. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
industrial implementations, reuseable software modules, reuseable model elements, message sequence encoding, protocol entities, ISO/OSI Reference Model, generalised model, interlayer communication model, modified TTCN notation, Petri nets, protocols, communication protocols, networking protocols, object-oriented modelling, formal descriptions, protocol implementation, alternating bit protocol |
33 | Mike Bond |
The Dining Freemasons (Security Protocols for Secret Societies). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Richard Clayton |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Mike Bond, George Danezis |
The Dining Freemasons (Security Protocols for Secret Societies). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
33 | N. Asokan |
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
Deniable Authenticated Key Establishment for Internet Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson |
Is the Verification Problem for Cryptographic Protocols Solved?. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Brian Monahan |
From Security Protocols to Systems Security. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Geraint Price |
Client v. Server Side Protocols, Interfaces and Storage (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Towards Flexible Credential Negotiation Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Chris Blondia, Olga Casals, Peter De Cleyn, Gert Willems |
Performance Analysis of IP Micro-mobility Handoff Protocols. |
Protocols for High-Speed Networks |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Amos Beimel, Yoav Stahl |
Robust Information-Theoretic Private Information Retrieval. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Alper Kanak, Öznur Özkasap |
Transport Protocol Mechanisms for Wireless Networking: A Review and Comparative Simulation Study. |
ISCIS |
2003 |
DBLP DOI BibTeX RDF |
wireless transport protocols, split-connection protocols, wired-cum-wireless, TCP, end-to-end protocols |
31 | Dieter Gollmann |
What do We Mean by Entity Authentication? |
S&P |
1996 |
DBLP DOI BibTeX RDF |
authentication protocol design, message passing protocols, high-level objectives, protocol specification abstraction level, cryptographic function, formal specification, cryptography, protocols, message passing, encryption, communication protocols, message authentication, entity authentication |
31 | Matthias Krause 0001, Dirk Stegemann |
More on the Security of Linear RFID Authentication Protocols. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography |
31 | Tim Miller 0001, Peter McBurney |
Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols. |
ESAW |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Fernando Pedone |
Boosting System Performance with Optimistic Distributed Protocols. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Tim Miller 0001, Peter McBurney |
Annotation and Matching of First-Class Agent Interaction Protocols. |
ArgMAS |
2008 |
DBLP DOI BibTeX RDF |
first-class protocols, multi-agent systems, annotation, matching, agent interaction |
31 | Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 |
Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
Peer-to-peer (P2P) systems, mutual anonymity, overlay networks, communication protocols, Internet systems |
31 | Sajal K. Das 0001 |
Coping with uncertainty in wireless mobile networks: an information theoretic framework. |
Mobility Management & Wireless Access Protocols |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Hassen Saïdi, Victoria Stavridou, Bruno Dutertre |
Protocol Codesign. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Jari Arkko, Pekka Nikander |
Limitations of IPsec Policy Mechanisms. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Victoria Stavridou |
Protocol Codesign (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Teunis J. Ott |
Transport Protocols in the TCP Paradigm and their Performance. |
Telecommun. Syst. |
2005 |
DBLP DOI BibTeX RDF |
performance of transport protocols, Internet, performance, TCP, transport protocols, protocol analysis |
31 | Lívia M. R. Sampaio, Francisco Vilar Brasileiro, André L. C. Moreira |
Performance Analysis of Adaptive Consensus Protocols Based on Slowness Oracles. |
ICDCS Workshops |
2004 |
DBLP DOI BibTeX RDF |
adaptive distributed protocols, slowness oracles, asynchronous distributed systems, unreliable failure detectors, consensus protocols |
31 | Olivier Markowitch, Dieter Gollmann, Steve Kremer |
On Fairness in Exchange Protocols. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
exchange protocols, fairness, security protocols, fair exchange, security properties |
31 | W. Timothy Strayer |
A Class-Chest for Deriving Transport Protocols. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
class-chest, protocol algorithms, prebuilt infrastructure, Meta-Transport Library, C++ base classes library, Unix environment, rapid prototyping, transport protocols, transport protocols, protocol implementations |
31 | Li Gong |
Optimal authentication protocols resistant to password guessing attacks. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks |
31 | David W. Pritty, Duncan N. Smeed, Norman L. Lawrie |
A new class of high speed LAN access protocols based on the principle of timed packet release. |
LCN |
1995 |
DBLP DOI BibTeX RDF |
timed packet release, high speed local area network, bus structures, TPR, performance evaluation, performance, discrete event simulation, discrete event simulation, local area networks, access protocols, access protocols, comparative evaluation, high speed LAN |
31 | Bruno Ciciani, Daniel M. Dias, Philip S. Yu |
Analysis of Concurrency-Coherency Control Protocols for Distributed Transaction Processing Systems with Regional Locality. |
IEEE Trans. Software Eng. |
1992 |
DBLP DOI BibTeX RDF |
concurrency-coherency control protocols, distributed transaction processing systems, fully replicated databases, duplicate copies, approximate analytic model, performance evaluation, performance, databases, protocols, delay, distributed processing, distributed databases, concurrency control, transaction processing |
31 | Naftaly H. Minsky |
The Imposition of Protocols Over Open Distributed Systems. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
enforced specification, online distributed updating, global law, protocols, protocols, distributed processing, open distributed systems |
31 | Ricardo Bianchini, Leonidas I. Kontothanassis |
Algorithms for categorizing multiprocessor communication under invalidate and update-based coherence protocols. |
Annual Simulation Symposium |
1995 |
DBLP DOI BibTeX RDF |
shared-memory multiprocessor communication, invalidate-based cache coherence protocols, update-based cache coherence protocols, reference patterns, sharing patterns, useless data traffic, data traffic categorization, parallel programming, parallel programs, virtual machines, transaction processing, shared memory systems, coherence, cache storage, telecommunication traffic, cache misses, simulation algorithms, update transactions, memory protocols |
31 | Deepinder P. Sidhu, Juan Aristizabal |
Constructing Submodule Specifications and Network Protocols. |
IEEE Trans. Software Eng. |
1988 |
DBLP DOI BibTeX RDF |
submodule specifications, module specification, formal specification, formal specification, protocols, software tools, finite-state machine, communication protocols, network protocols, finite automata, automated tool, execution sequences |
30 | João L. Sobrinho |
Network routing with path vector protocols: theory and applications. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
path vector protocols, BGP, border gateway protocol, algebra |
30 | Ford-Long Wong |
Multi-channel Protocols. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Richard Clayton 0001 |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Ford-Long Wong, Frank Stajano |
Multi-channel Protocols. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Virgil D. Gligor |
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Hoon Wei Lim |
User-Friendly Grid Security Architecture and Protocols. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Yvo Desmedt |
Understanding Why Some Network Protocols Are User-Unfriendly. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 34979 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|