Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Network protocol")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1413

  • Page / 57
Export

Selection :

  • and

12th IEEE international conference on network protocols (Berlin, 5-8 October 2004)IEEE international conference on network protocols. 2004, isbn 0-7695-2161-4, 1Vol, XI-374 p, isbn 0-7695-2161-4Conference Proceedings

Mutually independent commitmentsLISKOV, Moses; LYSYANSKAYA, Anna; MICALI, Silvio et al.Lecture notes in computer science. 2001, pp 385-401, issn 0302-9743, isbn 3-540-42987-5Conference Paper

Responsive round complexity and concurrent zero-knowledgeCOHENL, Tzafrir; KILIAN, Joe; PETRANK, Erez et al.Lecture notes in computer science. 2001, pp 422-441, issn 0302-9743, isbn 3-540-42987-5Conference Paper

Building a Multi-Scenario Asset Allocation System Using Two-Phase Contract Network ProtocolCHENG, Hilary; LU, Yi-Chun; WANG, Wei-Hsaio et al.Information & knowledge engineering. International conferenceWorldComp'2010. 2010, pp 157-162, isbn 1-60132-151-1, 6 p.Conference Paper

Performance Metrics for AllMORTON, Al.IEEE internet computing. 2009, Vol 13, Num 4, pp 82-86, issn 1089-7801, 5 p.Article

LTE/SAE Security Issues on 4G Wireless NetworksBIKOS, Anastasios N; SKLAVOS, Nicolas.IEEE security & privacy. 2013, Vol 11, Num 2, pp 55-62, issn 1540-7993, 8 p.Article

Satellite network protocolsKOTA, S. L.Space communications. 2005, Vol 20, Num 3-4, pp 99-100, issn 0924-8625, 2 p.Article

Bandwidth-efficient resilience in metro networks : A fast network-processor-based RPR implementationKIRSTÄDTE, Andreas; HOF, Axel; MEYER, Walter et al.Workshop on high performance switching and routing. 2004, pp 355-359, isbn 0-7803-8375-3, 1Vol, 5 p.Conference Paper

Application of cognitive radio technology across the wireless stackKOLODZY, Paul.IEICE transactions on communications. 2005, Vol 88, Num 11, pp 4158-4162, issn 0916-8516, 5 p.Article

High performance cluster management based on SNMP: Experiences on integration between network patterns and cluster management conceptsALVES, Rodrigo Sanger; MARQUEZAN, Clarissa Cassales; GRANVILLE, Lisandro Zambenedetti et al.Lecture notes in computer science. 2004, pp 782-791, issn 0302-9743, isbn 3-540-22571-4, 10 p.Conference Paper

Script MIB extension for resource limitation in SNMP distributed management environmentsROCHA, Atslands Da; DA ROCHA, Cris Amon; NEUMAN DE SOUZA, J et al.Lecture notes in computer science. 2004, pp 835-840, issn 0302-9743, isbn 3-540-22571-4, 6 p.Conference Paper

Trust requirements and performance of a fast subtransport-level protocol for secure communicationVENKAT RANGAN, P.IEEE transactions on software engineering. 1993, Vol 19, Num 2, pp 181-186, issn 0098-5589Article

Broadening the scope of fault tolerance within secure services. DiscussionPRICE, Geraint.Lecture notes in computer science. 2001, pp 155-169, issn 0302-9743, isbn 3-540-42566-7Conference Paper

TTCN : Towards a formal semantics and validation of test suitesKRISTOFFERSEN, F; WALTER, T.Computer networks and ISDN systems. 1996, Vol 29, Num 1, pp 15-47, issn 0169-7552Article

Universally composable notions of key exchange and secure channelsCANETTI, Ran; KRAWCZYK, Hugo.Lecture notes in computer science. 2002, pp 337-351, issn 0302-9743, isbn 3-540-43553-0Conference Paper

Taming the adversaryABADI, M.Lecture notes in computer science. 2000, pp 353-358, issn 0302-9743, isbn 3-540-67907-3Conference Paper

Deniable authentication protocolsDENG, X; LEE, C. H; ZHU, H et al.IEE proceedings. Computers and digital techniques. 2001, Vol 148, Num 2, pp 101-104, issn 1350-2387Article

Conformance testing with labelled transition systems : Implementation relations and test generationTRETMANS, J.Computer networks and ISDN systems. 1996, Vol 29, Num 1, pp 49-79, issn 0169-7552Article

A provably secure restrictive partially blind signature schemeMAITLAND, Greg; BOYD, Colin.Lecture notes in computer science. 2002, pp 99-114, issn 0302-9743, isbn 3-540-43168-3Conference Paper

An Equivalent Division Method for Reducing Test Cases in State Transition Testing of MANET Protocols : Ad Hoc and Mesh Networking for Next Generation Access SystemsKOJIMA, Hideharu; TAKAHASHI, Juichi; OHTA, Tomoyuki et al.IEICE transactions on communications. 2009, Vol 92, Num 3, pp 794-806, issn 0916-8516, 13 p.Article

The representation problem based on factoringFISCHLIN, Marc; FISCHLIN, Roger.Lecture notes in computer science. 2002, pp 96-113, issn 0302-9743, isbn 3-540-43224-8Conference Paper

Improved non-committing encryption schemes based on a general complexity assumptionDAMGARD, I; NIELSEN, J. B.Lecture notes in computer science. 2000, pp 432-450, issn 0302-9743, isbn 3-540-67907-3Conference Paper

Efficient non-malleable commitment schemesFISCHLIN, M; FISCHLIN, R.Lecture notes in computer science. 2000, pp 413-431, issn 0302-9743, isbn 3-540-67907-3Conference Paper

On fault coverage of tests for finite state specificationsPETRENKO, A; BOCHMANN, G. V; YAO, M et al.Computer networks and ISDN systems. 1996, Vol 29, Num 1, pp 81-106, issn 0169-7552Article

Round efficiency of multi-party computation with a dishonest majorityKATZ, Jonathan; OSTROVSKY, Rafail; SMITH, Adam et al.Lecture notes in computer science. 2003, pp 578-595, issn 0302-9743, isbn 3-540-14039-5, 18 p.Conference Paper

  • Page / 57