Wojciechowski, Paweł T.; Rütti, Olivier On correctness of dynamic protocol update. (English) Zbl 1461.68033 Steffen, Martin (ed.) et al., Formal methods for open object-based distributed systems. 7th IFIP WG 6.1 international conference, FMOODS 2005, Athens, Greece, June 15–17, 2005. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3535, 275-289 (2005). MSC: 68M12 PDFBibTeX XMLCite \textit{P. T. Wojciechowski} and \textit{O. Rütti}, Lect. Notes Comput. Sci. 3535, 275--289 (2005; Zbl 1461.68033) Full Text: DOI
Lin, Rui; Petropulu, Athina P. A new wireless network medium access protocol based on cooperation. (English) Zbl 1370.94016 IEEE Trans. Signal Process. 53, No. 12, 4675-4684 (2005). MSC: 94A05 68M12 PDFBibTeX XMLCite \textit{R. Lin} and \textit{A. P. Petropulu}, IEEE Trans. Signal Process. 53, No. 12, 4675--4684 (2005; Zbl 1370.94016) Full Text: DOI
Marquez, Richard; Altman, Eitan; Solé-Álvarez, Solazver Time-averaging of high-speed data transfer protocols. (English) Zbl 1365.68067 IEEE Trans. Autom. Control 50, No. 12, 2065-2069 (2005). MSC: 68M12 93C83 PDFBibTeX XMLCite \textit{R. Marquez} et al., IEEE Trans. Autom. Control 50, No. 12, 2065--2069 (2005; Zbl 1365.68067) Full Text: DOI
Seiler, Pete; Sengupta, Raja An \(H_{\infty}\) approach to networked control. (English) Zbl 1365.93147 IEEE Trans. Autom. Control 50, No. 3, 356-364 (2005). MSC: 93B36 93B52 93C83 60J75 68M12 PDFBibTeX XMLCite \textit{P. Seiler} and \textit{R. Sengupta}, IEEE Trans. Autom. Control 50, No. 3, 356--364 (2005; Zbl 1365.93147) Full Text: DOI
Gaffney, E. A. The mathematical modelling of adjuvant chemotherapy scheduling: incorporating the effects of protocol rest phases and pharmacokinetics. (English) Zbl 1334.92199 Bull. Math. Biol. 67, No. 3, 563-611 (2005). MSC: 92C50 92C40 PDFBibTeX XMLCite \textit{E. A. Gaffney}, Bull. Math. Biol. 67, No. 3, 563--611 (2005; Zbl 1334.92199) Full Text: DOI
Adler, Micah; Rubenstein, Dan Pricing multicasting in more flexible network models. (English) Zbl 1321.68036 ACM Trans. Algorithms 1, No. 1, 48-73 (2005). MSC: 68M12 68Q17 68Q25 68W15 PDFBibTeX XMLCite \textit{M. Adler} and \textit{D. Rubenstein}, ACM Trans. Algorithms 1, No. 1, 48--73 (2005; Zbl 1321.68036) Full Text: DOI
Subramanian, Lakshminarayanan; Katz, Randy H.; Roth, Volker; Shenker, Scott; Stoica, Ion Reliable broadcast in unknown fixed-identity networks. (English) Zbl 1314.68050 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 342-351 (2005). MSC: 68M12 05C85 68M14 68M15 68Q25 68R10 68W15 94A60 PDFBibTeX XMLCite \textit{L. Subramanian} et al., in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 342--351 (2005; Zbl 1314.68050) Full Text: DOI
Hevia, Alejandro; Micciancio, Daniele Simultaneous broadcast revisited. (English) Zbl 1314.68158 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 324-333 (2005). MSC: 68Q25 68M12 68M14 68M15 68Q17 90B15 94A62 PDFBibTeX XMLCite \textit{A. Hevia} and \textit{D. Micciancio}, in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 324--333 (2005; Zbl 1314.68158) Full Text: DOI
Bazzi, Rida A.; Konjevod, Goran On the establishment of distinct identities in overlay networks. (English) Zbl 1314.68039 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 312-320 (2005). MSC: 68M12 68M14 68M15 68N15 94A60 PDFBibTeX XMLCite \textit{R. A. Bazzi} and \textit{G. Konjevod}, in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 312--320 (2005; Zbl 1314.68039) Full Text: DOI
Allavena, André; Demers, Alan; Hopcroft, John E. Correctness of a gossip based membership protocol. (English) Zbl 1314.68038 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 292-301 (2005). MSC: 68M12 68M14 68R10 68W15 90B18 PDFBibTeX XMLCite \textit{A. Allavena} et al., in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 292--301 (2005; Zbl 1314.68038) Full Text: DOI
Fischer, Simon; Vöcking, Berthold Adaptive routing with stale information. (English) Zbl 1314.68040 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 276-283 (2005). MSC: 68M12 68M14 68Q25 68Q87 68R10 68W15 91A06 91A15 PDFBibTeX XMLCite \textit{S. Fischer} and \textit{B. Vöcking}, in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 276--283 (2005; Zbl 1314.68040) Full Text: DOI
Gordon, Eyal; Rosén, Adi Competitive weighted throughput analysis of greedy protocols on DAGs. (English) Zbl 1314.68042 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 227-236 (2005). MSC: 68M12 05C20 05C85 68M14 68Q17 68W15 PDFBibTeX XMLCite \textit{E. Gordon} and \textit{A. Rosén}, in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 227--236 (2005; Zbl 1314.68042) Full Text: DOI
Angel, Omer; Benjamini, Itai; Ofek, Eran; Wieder, Udi Routing complexity of faulty networks. (English) Zbl 1314.68150 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 209-217 (2005). MSC: 68Q25 05C80 05C85 68M12 68M14 68M15 68R10 PDFBibTeX XMLCite \textit{O. Angel} et al., in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 209--217 (2005; Zbl 1314.68150) Full Text: DOI arXiv
Chockler, Gregory; Demirbas, Murat; Gilbert, Seth; Newport, Calvin; Nolte, Tina Consensus and collision detectors in wireless ad hoc networks. (English) Zbl 1314.68368 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 197-206 (2005). MSC: 68W15 68M12 68M14 68M15 68Q17 90B10 90C35 PDFBibTeX XMLCite \textit{G. Chockler} et al., in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 197--206 (2005; Zbl 1314.68368) Full Text: DOI
Morselli, Ruggero; Bhattacharjee, Bobby; Srinivasan, Aravind; Marsh, Michael A. Efficient lookup on unstructured topologies. (English) Zbl 1314.68385 Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 77-86 (2005). MSC: 68W15 68M10 68M12 68M14 68R10 PDFBibTeX XMLCite \textit{R. Morselli} et al., in: Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC '05, Las Vegas, NV, USA, July 17--20, 2005. New York, NY: Association for Computing Machinery (ACM). 77--86 (2005; Zbl 1314.68385) Full Text: DOI Link
Räcke, Harald; Rosén, Adi Distributed online call control on general networks. (English) Zbl 1297.68035 Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23–25, 2005. New York, NY: ACM Press (ISBN 0-89871-585-7). 791-800 (2005). MSC: 68M14 68M12 68W27 PDFBibTeX XMLCite \textit{H. Räcke} and \textit{A. Rosén}, in: Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23--25, 2005. New York, NY: ACM Press. 791--800 (2005; Zbl 1297.68035)
Even-Dar, Eyal; Mansour, Yishay Fast convergence of selfish rerouting. (English) Zbl 1297.68034 Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23–25, 2005. New York, NY: ACM Press (ISBN 0-89871-585-7). 772-781 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{E. Even-Dar} and \textit{Y. Mansour}, in: Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23--25, 2005. New York, NY: ACM Press. 772--781 (2005; Zbl 1297.68034)
Adler, Micah Collecting correlated information from a sensor network. (English) Zbl 1297.68032 Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23–25, 2005. New York, NY: ACM Press (ISBN 0-89871-585-7). 479-488 (2005). MSC: 68M14 68M12 94A15 PDFBibTeX XMLCite \textit{M. Adler}, in: Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23--25, 2005. New York, NY: ACM Press. 479--488 (2005; Zbl 1297.68032)
Johnson, Mark W.; McBurney, Peter; Parsons, Simon A mathematical model of dialog. (English) Zbl 1276.68151 Goldin, Dina (ed.) et al., Proceedings of the workshop on the foundations of interactive computation (FInCo 2005), Edinburgh, UK, April 9, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 141, No. 5, 33-48 (2005). MSC: 68T42 PDFBibTeX XMLCite \textit{M. W. Johnson} et al., Electron. Notes Theor. Comput. Sci. 141, No. 5, 33--48 (2005; Zbl 1276.68151) Full Text: Link
Blom, Stefan; Groote, Jan Friso; Mauw, Sjouke; Serebrenik, Alexander Analysing the BKE-security protocol with \(\mu\)CRL. (English) Zbl 1272.68224 Ulidowski, Irek (ed.), Proceedings of ARTS 2004, the 6th AMAST workshop on real-time systems (ARTS 2004), Stirling, UK, July 12, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 139, No. 1, 49-90 (2005). MSC: 68Q60 68M12 94A60 PDFBibTeX XMLCite \textit{S. Blom} et al., Electron. Notes Theor. Comput. Sci. 139, No. 1, 49--90 (2005; Zbl 1272.68224) Full Text: Link
Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis Static validation of a voting protocol. (English) Zbl 1272.94086 Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 115-134 (2005). MSC: 94A62 68M12 68Q60 PDFBibTeX XMLCite \textit{C. R. Nielsen} et al., Electron. Notes Theor. Comput. Sci. 135, No. 1, 115--134 (2005; Zbl 1272.94086) Full Text: Link
Nesi, Monica; Rucci, Giuseppina Formalizing and analyzing the Needham-Schroeder symmetric-key protocol by rewriting. (English) Zbl 1272.94085 Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 95-114 (2005). MSC: 94A62 68M12 68Q42 PDFBibTeX XMLCite \textit{M. Nesi} and \textit{G. Rucci}, Electron. Notes Theor. Comput. Sci. 135, No. 1, 95--114 (2005; Zbl 1272.94085) Full Text: Link
Imamoto, Kenji; Sakurai, Kouichi Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. (English) Zbl 1272.94082 Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 79-94 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{K. Imamoto} and \textit{K. Sakurai}, Electron. Notes Theor. Comput. Sci. 135, No. 1, 79--94 (2005; Zbl 1272.94082) Full Text: Link
Cremers, C. J. F.; Mauw, S.; De Vink, E. P. A syntactic criterion for injectivity of authentication protocols. (English) Zbl 1272.94077 Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 23-38 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{C. J. F. Cremers} et al., Electron. Notes Theor. Comput. Sci. 135, No. 1, 23--38 (2005; Zbl 1272.94077) Full Text: Link
Caleiro, Carlos; Viganò, Luca; Basin, David Deconstructing Alice and Bob. (English) Zbl 1272.68052 Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 3-22 (2005). MSC: 68M12 94A60 PDFBibTeX XMLCite \textit{C. Caleiro} et al., Electron. Notes Theor. Comput. Sci. 135, No. 1, 3--22 (2005; Zbl 1272.68052) Full Text: Link
Dunn-Davies, H. R.; Cunningham, R. J.; Paurobally, S. Propositional statecharts for agent interaction protocols. (English) Zbl 1272.68055 Rodgers, P. (ed.), Proceedings of the first international workshop on Euler diagrams (Euler 2004), University of Brighton, Brighton, UK, September 22–23, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 134, 55-75 (2005). MSC: 68M12 PDFBibTeX XMLCite \textit{H. R. Dunn-Davies} et al., Electron. Notes Theor. Comput. Sci. 134, 55--75 (2005; Zbl 1272.68055) Full Text: Link
Duflot, Marie; Fribourg, Laurent; Herault, Thomas; Lassaigne, Richard; Magniette, Frédéric; Messika, Stéphane; Peyronnet, Sylvain; Picaronny, Claudine Probabilistic model checking of the CSMA/CD protocol using PRISM and APMC. (English) Zbl 1272.68242 Huth, Michael R. A. (ed.), Proceedings of the fourth international workshop on automated verification of critical systems (AVoCS 2004), London, UK, September 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 128, No. 6, 195-214 (2005). MSC: 68Q60 68M12 PDFBibTeX XMLCite \textit{M. Duflot} et al., Electron. Notes Theor. Comput. Sci. 128, No. 6, 195--214 (2005; Zbl 1272.68242) Full Text: Link
Hommersom, Arjen; Meyer, John-Jules; de Vink, Erik Toward reasoning about security protocols: a semantic approach. (English) Zbl 1272.68059 van der Hoek, Wiebe (ed.) et al., Proceedings of the 2nd international workshop on logic and communication in multi-agent systems, LCMAS, Nancy, France, August, 16–20, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 126, 53-75 (2005). MSC: 68M12 03B42 68T27 68T42 PDFBibTeX XMLCite \textit{A. Hommersom} et al., Electron. Notes Theor. Comput. Sci. 126, 53--75 (2005; Zbl 1272.68059) Full Text: Link
Hankes Drielsma, Paul; Mödersheim, Sebastian The ASW protocol revisited: a unified view. (English) Zbl 1272.68056 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 145-161 (2005). MSC: 68M12 68Q60 94A62 PDFBibTeX XMLCite \textit{P. Hankes Drielsma} and \textit{S. Mödersheim}, Electron. Notes Theor. Comput. Sci. 125, No. 1, 145--161 (2005; Zbl 1272.68056) Full Text: Link
Steel, Graham; Bundy, Alan Attacking group multicast key management protocols using Coral. (English) Zbl 1272.68060 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 125-144 (2005). MSC: 68M12 94A60 PDFBibTeX XMLCite \textit{G. Steel} and \textit{A. Bundy}, Electron. Notes Theor. Comput. Sci. 125, No. 1, 125--144 (2005; Zbl 1272.68060) Full Text: Link
Armando, Alessandro; Compagna, Luca An optimized intruder model for SAT-based model-checking of security protocols. (English) Zbl 1272.68047 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 91-108 (2005). MSC: 68M12 68Q60 94A60 PDFBibTeX XMLCite \textit{A. Armando} and \textit{L. Compagna}, Electron. Notes Theor. Comput. Sci. 125, No. 1, 91--108 (2005; Zbl 1272.68047) Full Text: Link
Caleiro, Carlos; Viganò, Luca; Basin, David Metareasoning about security protocols using distributed temporal logic. (English) Zbl 1272.68051 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 67-89 (2005). MSC: 68M12 03B44 PDFBibTeX XMLCite \textit{C. Caleiro} et al., Electron. Notes Theor. Comput. Sci. 125, No. 1, 67--89 (2005; Zbl 1272.68051) Full Text: Link
Chevalier, Yannick; Küsters, Ralf; Rusinowitch, Michaël; Turuani, Mathieu Deciding the security of protocols with commuting public key encryption. (English) Zbl 1272.94022 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 55-66 (2005). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{Y. Chevalier} et al., Electron. Notes Theor. Comput. Sci. 125, No. 1, 55--66 (2005; Zbl 1272.94022) Full Text: Link
Lynch, Christopher; Meadows, Catherine On the relative soundness of the free algebra model for public key encryption. (English) Zbl 1272.94049 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 43-54 (2005). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{C. Lynch} and \textit{C. Meadows}, Electron. Notes Theor. Comput. Sci. 125, No. 1, 43--54 (2005; Zbl 1272.94049) Full Text: Link
Hao, Chen; Clark, John A.; Jacob, Jeremy L. Synthesising efficient and effective security protocols. (English) Zbl 1272.68057 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 25-41 (2005). MSC: 68M12 68T20 PDFBibTeX XMLCite \textit{C. Hao} et al., Electron. Notes Theor. Comput. Sci. 125, No. 1, 25--41 (2005; Zbl 1272.68057) Full Text: Link
Bond, Mike; Clulow, Jolyon Extending security protocol analysis: new challenges. (English) Zbl 1272.68050 Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 13-24 (2005). MSC: 68M12 94A60 PDFBibTeX XMLCite \textit{M. Bond} and \textit{J. Clulow}, Electron. Notes Theor. Comput. Sci. 125, No. 1, 13--24 (2005; Zbl 1272.68050) Full Text: Link
Bodei, Chiara; Curti, Michele; Degano, Pierpaolo; Priami, Corrado A quantitative study of two attacks. (English) Zbl 1272.68049 Busi, N. (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 121, 65-85 (2005). MSC: 68M12 94A60 PDFBibTeX XMLCite \textit{C. Bodei} et al., Electron. Notes Theor. Comput. Sci. 121, 65--85 (2005; Zbl 1272.68049) Full Text: Link
Corin, Ricardo; Doumen, Jeroen; Etalle, Sandro Analysing password protocol security against off-line dictionary attacks. (English) Zbl 1272.68053 Busi, N. (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 121, 47-63 (2005). MSC: 68M12 68Q85 94A62 PDFBibTeX XMLCite \textit{R. Corin} et al., Electron. Notes Theor. Comput. Sci. 121, 47--63 (2005; Zbl 1272.68053) Full Text: Link
Baldi, Giacomo; Bracciali, Andrea; Ferrari, Gianluigi; Tuosto, Emilio A coordination-based methodology for security protocol verification. (English) Zbl 1272.68048 Busi, N. (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 121, 23-46 (2005). MSC: 68M12 68Q85 PDFBibTeX XMLCite \textit{G. Baldi} et al., Electron. Notes Theor. Comput. Sci. 121, 23--46 (2005; Zbl 1272.68048) Full Text: Link
Hélouët, Loïc; Zeitoun, Marc; Degorre, Aldric Scenarios and covert channels: another game…. (English) Zbl 1272.68058 de Alfaro, L. (ed.), Proceedings of the workshop on games in design and verification (GDV 2004), Boston, MA, USA, June 18, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 119, No. 1, 93-116 (2005). MSC: 68M12 91A80 PDFBibTeX XMLCite \textit{L. Hélouët} et al., Electron. Notes Theor. Comput. Sci. 119, No. 1, 93--116 (2005; Zbl 1272.68058) Full Text: Link
Zakiuddin, Irfan; Hawkins, Tim; Moffat, Nick Towards a game theoretic understanding of ad-hoc routing. (English) Zbl 1272.68045 de Alfaro, L. (ed.), Proceedings of the workshop on games in design and verification (GDV 2004), Boston, MA, USA, June 18, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 119, No. 1, 67-92 (2005). MSC: 68M10 68M12 91A80 PDFBibTeX XMLCite \textit{I. Zakiuddin} et al., Electron. Notes Theor. Comput. Sci. 119, No. 1, 67--92 (2005; Zbl 1272.68045) Full Text: Link
Luukkainen, Matti; Shanbhag, Vivek K.; Gopinath, K. Verifying a UMTS protocol using Spin and EASN. (English) Zbl 1272.68270 Etalle, S. (ed.) et al., Proceedings of the international workshop on software verification and validation (SVV 2003), Mumbai, India, December 9–13, 2003. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 118, 71-85 (2005). MSC: 68Q60 68M12 PDFBibTeX XMLCite \textit{M. Luukkainen} et al., Electron. Notes Theor. Comput. Sci. 118, 71--85 (2005; Zbl 1272.68270) Full Text: Link
Degano, Pierpaolo (ed.); Viganó, Luca (ed.) Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. (English) Zbl 1272.68016 Electronic Notes in Theoretical Computer Science 135, No. 1. Amsterdam: Elsevier. 134 p., electronic only (2005). MSC: 68-06 68M12 68T15 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{P. Degano} (ed.) and \textit{L. Viganó} (ed.), Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier (2005; Zbl 1272.68016) Full Text: Link
Busi, N. (ed.); Gorrieri, R. (ed.); Martinelli, F. (ed.) Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. (English) Zbl 1271.68027 Electronic Notes in Theoretical Computer Science 121. Amsterdam: Elsevier. 156 p., electronic only (2005). MSC: 68-06 94-06 68M12 68Q85 94A60 00B25 PDFBibTeX XMLCite \textit{N. Busi} (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier (2005; Zbl 1271.68027) Full Text: Link
Armando, A. (ed.); Viganò, L. (ed.) Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. (English) Zbl 1271.68018 Electronic Notes in Theoretical Computer Science 125, No. 1. Amsterdam: Elsevier. 161 p., electronic only (2005). MSC: 68-06 94-06 68M12 68T15 00B25 PDFBibTeX XMLCite \textit{A. Armando} (ed.) and \textit{L. Viganò} (ed.), Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier (2005; Zbl 1271.68018) Full Text: Link
Beimel, Amos; Malka, Lior Efficient reliable communication over partially authenticated networks. (English) Zbl 1264.94107 Distrib. Comput. 18, No. 1, 1-19 (2005). MSC: 94A62 68M12 68M14 68M15 PDFBibTeX XMLCite \textit{A. Beimel} and \textit{L. Malka}, Distrib. Comput. 18, No. 1, 1--19 (2005; Zbl 1264.94107) Full Text: DOI
Holenstein, Thomas Key agreement from weak bit agreement. (English) Zbl 1192.94099 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 664-673 (2005). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{T. Holenstein}, in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 664--673 (2005; Zbl 1192.94099) Full Text: DOI
Kalai, Yael Tauman; Lindell, Yehuda; Prabhakaran, Manoj Concurrent general composition of secure protocols in the timing model. (English) Zbl 1192.94121 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 644-653 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{Y. T. Kalai} et al., in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 644--653 (2005; Zbl 1192.94121) Full Text: DOI
Lepinksi, Matt; Micali, Silvio; Shelat, Abhi Collusion-free protocols. (English) Zbl 1192.94122 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 543-552 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{M. Lepinksi} et al., in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 543--552 (2005; Zbl 1192.94122) Full Text: DOI
Pass, Rafael; Rosen, Alon New and improved constructions of non-malleable cryptographic protocols. (English) Zbl 1192.94104 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 533-542 (2005). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{R. Pass} and \textit{A. Rosen}, in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 533--542 (2005; Zbl 1192.94104) Full Text: DOI Link
von Ahn, Luis; Hopper, Nicholas; Langford, John Covert two-party computation. (English) Zbl 1192.94111 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 513-522 (2005). MSC: 94A60 68M12 94A62 PDFBibTeX XMLCite \textit{L. von Ahn} et al., in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 513--522 (2005; Zbl 1192.94111) Full Text: DOI
Ben-Or, Michael; Hassidim, Avinatan Fast quantum byzantine agreement (extended abstract). (English) Zbl 1192.81053 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 481-485 (2005). MSC: 81P68 68M12 68Q10 94A62 PDFBibTeX XMLCite \textit{M. Ben-Or} and \textit{A. Hassidim}, in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 481--485 (2005; Zbl 1192.81053) Full Text: DOI
Sanghvi, Saurabh; Vadhan, Salil The round complexity of two-party random selection. (English) Zbl 1192.68281 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 338-347 (2005). MSC: 68Q10 68M12 68Q25 PDFBibTeX XMLCite \textit{S. Sanghvi} and \textit{S. Vadhan}, in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 338--347 (2005; Zbl 1192.68281) Full Text: DOI Link
Hajiaghayi, Mohammad Taghi; Kim, Jeong Han; Leighton, Tom; Räcke, Harald Oblivious routing in directed graphs with random demands. (English) Zbl 1192.90229 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 193-201 (2005). MSC: 90C35 68R10 05C20 68M12 PDFBibTeX XMLCite \textit{M. T. Hajiaghayi} et al., in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 193--201 (2005; Zbl 1192.90229) Full Text: DOI
Blanchet, Bruno Security protocols: from linear to classical logic by abstract interpretation. (English) Zbl 1185.68310 Inf. Process. Lett. 95, No. 5, 473-479 (2005). MSC: 68P25 68Q42 PDFBibTeX XMLCite \textit{B. Blanchet}, Inf. Process. Lett. 95, No. 5, 473--479 (2005; Zbl 1185.68310) Full Text: DOI
van Ditmarsch, Hans P. The case of the hidden hand. (English) Zbl 1182.68086 J. Appl. Non-Class. Log. 15, No. 4, 437-452 (2005). MSC: 68P25 03B42 68M12 94A60 PDFBibTeX XMLCite \textit{H. P. van Ditmarsch}, J. Appl. Non-Class. Log. 15, No. 4, 437--452 (2005; Zbl 1182.68086) Full Text: DOI Link
Kløve, Torleiv; Oprisan, Paul; Bose, Bella Diversity combining for the Z-channel. (English) Zbl 1309.94012 IEEE Trans. Inf. Theory 51, No. 3, 1174-1178 (2005). MSC: 94A05 94A40 PDFBibTeX XMLCite \textit{T. Kløve} et al., IEEE Trans. Inf. Theory 51, No. 3, 1174--1178 (2005; Zbl 1309.94012) Full Text: DOI
Adler, Micah Trade-offs in probabilistic packet marking for IP traceback. (English) Zbl 1312.68021 J. ACM 52, No. 2, 217-244 (2005). MSC: 68M12 68P30 94A62 PDFBibTeX XMLCite \textit{M. Adler}, J. ACM 52, No. 2, 217--244 (2005; Zbl 1312.68021) Full Text: DOI
Abadi, Martín; Blanchet, Bruno Analyzing security protocols with secrecy types and logic programs. (English) Zbl 1204.68030 J. ACM 52, No. 1, 102-146 (2005). MSC: 68M12 68Q55 68Q60 94A60 PDFBibTeX XMLCite \textit{M. Abadi} and \textit{B. Blanchet}, J. ACM 52, No. 1, 102--146 (2005; Zbl 1204.68030) Full Text: DOI
Choo, Kim-Kwang Raymond; Boyd, Colin; Hitchcock, Yvonne Errors in computational complexity proofs for protocols. (English) Zbl 1154.68334 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 624-643 (2005). MSC: 68M12 68Q25 94A62 PDFBibTeX XMLCite \textit{K.-K. R. Choo} et al., Lect. Notes Comput. Sci. 3788, 624--643 (2005; Zbl 1154.68334) Full Text: DOI
Abdalla, Michel; Chevassut, Olivier; Fouque, Pierre-Alain; Pointcheval, David A simple threshold authenticated key exchange from short secrets. (English) Zbl 1154.94446 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 566-584 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{M. Abdalla} et al., Lect. Notes Comput. Sci. 3788, 566--584 (2005; Zbl 1154.94446) Full Text: DOI
Liskov, Moses Updatable zero-knowledge databases. (English) Zbl 1154.94468 Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 174-198 (2005). MSC: 94A62 68P15 PDFBibTeX XMLCite \textit{M. Liskov}, Lect. Notes Comput. Sci. 3788, 174--198 (2005; Zbl 1154.94468) Full Text: DOI
Wolf, Stefan; Wullschleger, Jürg New monotones and lower bounds in unconditional two-party computation. (English) Zbl 1145.94476 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 467-477 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{S. Wolf} and \textit{J. Wullschleger}, Lect. Notes Comput. Sci. 3621, 467--477 (2005; Zbl 1145.94476) Full Text: DOI
Barkol, Omer; Ishai, Yuval Secure computation of constant-depth circuits with applications to database search problems. (English) Zbl 1145.68396 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 395-411 (2005). MSC: 68P15 68M12 94A62 94C10 PDFBibTeX XMLCite \textit{O. Barkol} and \textit{Y. Ishai}, Lect. Notes Comput. Sci. 3621, 395--411 (2005; Zbl 1145.68396) Full Text: DOI
Masuzawa, Toshimitsu; Kakugawa, Hirotsugu Self-stabilization in spite of frequent changes of networks: case study of mutual exclusion on dynamic rings. (English) Zbl 1172.68369 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 183-197 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{T. Masuzawa} and \textit{H. Kakugawa}, Lect. Notes Comput. Sci. 3764, 183--197 (2005; Zbl 1172.68369) Full Text: DOI
Dolev, Shlomi; Haviv, Yinnon; Sagiv, Mooly Self-stabilization preserving compiler. (Extended abstract). (English) Zbl 1172.68361 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 81-95 (2005). MSC: 68M14 68M12 68M15 68N20 PDFBibTeX XMLCite \textit{S. Dolev} et al., Lect. Notes Comput. Sci. 3764, 81--95 (2005; Zbl 1172.68361) Full Text: DOI
Delaët, Sylvie; Ducourthial, Bertrand; Tixeuil, Sébastien Self-stabilization with \(r\)-operators revisited. (English) Zbl 1172.68360 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 68-80 (2005). MSC: 68M14 68M12 68P05 68P10 68W15 PDFBibTeX XMLCite \textit{S. Delaët} et al., Lect. Notes Comput. Sci. 3764, 68--80 (2005; Zbl 1172.68360) Full Text: DOI
Daliot, Ariel; Dolev, Danny Self-stabilization of Byzantine protocols. (English) Zbl 1172.68359 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 48-67 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{A. Daliot} and \textit{D. Dolev}, Lect. Notes Comput. Sci. 3764, 48--67 (2005; Zbl 1172.68359) Full Text: DOI
Cournier, Alain; Devismes, Stéphane; Villain, Vincent A snap-stabilizing DFS with a lower space requirement. (English) Zbl 1172.68358 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 33-47 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{A. Cournier} et al., Lect. Notes Comput. Sci. 3764, 33--47 (2005; Zbl 1172.68358) Full Text: DOI
Boulinier, Christian; Petit, Franck; Villain, Vincent Synchronous vs. asynchronous unison. (English) Zbl 1172.68357 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 18-32 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{C. Boulinier} et al., Lect. Notes Comput. Sci. 3764, 18--32 (2005; Zbl 1172.68357) Full Text: DOI
Bein, Doina; Datta, Ajoy K.; Villain, Vincent Snap-stabilizing optimal binary search tree. (English) Zbl 1172.68355 Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 1-17 (2005). MSC: 68M14 68M12 68P05 68P10 68W15 PDFBibTeX XMLCite \textit{D. Bein} et al., Lect. Notes Comput. Sci. 3764, 1--17 (2005; Zbl 1172.68355) Full Text: DOI
Reiter, Michael K.; Wang, XiaoFeng; Wright, Matthew Building reliable mix networks with fair exchange. (English) Zbl 1126.68413 Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 378-392 (2005). MSC: 68P25 94A60 68M12 PDFBibTeX XMLCite \textit{M. K. Reiter} et al., Lect. Notes Comput. Sci. 3531, 378--392 (2005; Zbl 1126.68413) Full Text: DOI
Garcia, Flavio D.; Hoepman, Jaap-Henk Off-line karma: A decentralized currency for peer-to-peer and grid applications. (English) Zbl 1126.68394 Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 364-377 (2005). MSC: 68P25 94A60 68M12 PDFBibTeX XMLCite \textit{F. D. Garcia} and \textit{J.-H. Hoepman}, Lect. Notes Comput. Sci. 3531, 364--377 (2005; Zbl 1126.68394) Full Text: DOI Link
Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki Efficient and leakage-resilient authenticated key transport protocol based on RSA. (English) Zbl 1126.68415 Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 269-284 (2005). MSC: 68P25 94A60 68M12 94A62 PDFBibTeX XMLCite \textit{S. Shin} et al., Lect. Notes Comput. Sci. 3531, 269--284 (2005; Zbl 1126.68415) Full Text: DOI
Bozzano, Marco; Delzanno, Giorgio Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols. (English) Zbl 1137.68431 J. Symb. Comput. 38, No. 5, 1375-1415 (2004). MSC: 68Q60 68M12 94A60 PDFBibTeX XMLCite \textit{M. Bozzano} and \textit{G. Delzanno}, J. Symb. Comput. 38, No. 5, 1375--1415 (2005; Zbl 1137.68431) Full Text: DOI
Luss, Hanan Allocation of resources of modular sizes with an application to Internet Protocol (IP) address allocation. (English) Zbl 1291.91144 Nav. Res. Logist. 52, No. 8, 713-723 (2005). MSC: 91B32 68M12 PDFBibTeX XMLCite \textit{H. Luss}, Nav. Res. Logist. 52, No. 8, 713--723 (2005; Zbl 1291.91144) Full Text: DOI
Badis, Hakim; Al Agha, Khaldoun Efficient vertical handoffs in wireless overlay networks. (English) Zbl 1109.68014 Comput. Inform. 24, No. 5, 481-494 (2005). MSC: 68M14 68M12 68M20 PDFBibTeX XMLCite \textit{H. Badis} and \textit{K. Al Agha}, Comput. Inform. 24, No. 5, 481--494 (2005; Zbl 1109.68014)
Hu, Jinfeng; Zhang, Huanan; Zheng, Weimin Twins: scalable 2-hop structured overlay network. (English) Zbl 1109.68009 Comput. Inform. 24, No. 3, 249-261 (2005). MSC: 68M12 PDFBibTeX XMLCite \textit{J. Hu} et al., Comput. Inform. 24, No. 3, 249--261 (2005; Zbl 1109.68009)
El-Gendy, Hazem; El-Kadhi, Nabil Formal methods: Importance, experience, and comparative analysis. (English) Zbl 1124.68327 J. Comput. Methods Sci. Eng. 5, No. 1, Suppl., S235-S247 (2005). MSC: 68M15 68M14 68M12 PDFBibTeX XMLCite \textit{H. El-Gendy} and \textit{N. El-Kadhi}, J. Comput. Methods Sci. Eng. 5, No. 1, S235--S247 (2005; Zbl 1124.68327)
El-Gendy, Hazem; El-Kadhi, Nabil Formal method for automated testing data flow aspects of communications protocols, software, and systems specified in Lotos. (English) Zbl 1127.68345 J. Comput. Methods Sci. Eng. 5, No. 1, Suppl., S45-S56 (2005). MSC: 68M12 68M14 PDFBibTeX XMLCite \textit{H. El-Gendy} and \textit{N. El-Kadhi}, J. Comput. Methods Sci. Eng. 5, No. 1, S45--S56 (2005; Zbl 1127.68345)
Xia, ZhengYou; Wang, Jian; Jiang, YiChuan Design quality of security service negotiation protocol. (English) Zbl 1158.94389 Comput. Inform. 24, No. 2, 149-165 (2005). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{Z. Xia} et al., Comput. Inform. 24, No. 2, 149--165 (2005; Zbl 1158.94389)
Han, Keun-Hee; Kim, Il-Gon; Lee, Kang-Won; Choi, Jin-Young; Jeon, Sang-Hun Development of threat evaluation tool for distributed network environment. (English) Zbl 1107.68363 Comput. Inform. 24, No. 2, 109-121 (2005). MSC: 68M14 68M12 68W05 PDFBibTeX XMLCite \textit{K.-H. Han} et al., Comput. Inform. 24, No. 2, 109--121 (2005; Zbl 1107.68363)
Prieto, Constanza; Eterovic, Yadran Applying the GWO model to relaxed collaborative systems. (English) Zbl 1109.68017 Comput. Inform. 24, No. 1, 53-66 (2005). MSC: 68M14 68N19 68N30 PDFBibTeX XMLCite \textit{C. Prieto} and \textit{Y. Eterovic}, Comput. Inform. 24, No. 1, 53--66 (2005; Zbl 1109.68017)
Su, Kaile; Lü, Guanfeng; Chen, Qingliang Knowledge structure approach to verification of authentication protocols. (English) Zbl 1161.68323 Sci. China, Ser. F. 48, No. 4, 513-532 (2005). MSC: 68M12 03B42 PDFBibTeX XMLCite \textit{K. Su} et al., Sci. China, Ser. F 48, No. 4, 513--532 (2005; Zbl 1161.68323)
Oliveira, C. A. S.; Pardalos, P. M. Construction algorithms and approximation bounds for the streaming cache placement problem in multicast networks. (English. Russian original) Zbl 1102.68733 Cybern. Syst. Anal. 41, No. 6, 898-908 (2005); translation from Kibern. Sist. Anal. 2005, No. 6, 124-137 (2005). MSC: 68W25 68M10 68M12 PDFBibTeX XMLCite \textit{C. A. S. Oliveira} and \textit{P. M. Pardalos}, Cybern. Syst. Anal. 41, No. 6, 898--908 (2005; Zbl 1102.68733); translation from Kibern. Sist. Anal. 2005, No. 6, 124--137 (2005) Full Text: DOI
Abdulla, Parosh Aziz Verification of parameterized timed systems. (English) Zbl 1175.68254 Pettersson, Paul (ed.) et al., Formal modeling and analysis of timed systems. Third international conference, FORMATS 2005, Uppsala, Sweden, September 26–28, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30946-2/pbk). Lecture Notes in Computer Science 3829, 95-97 (2005). MSC: 68Q60 68M12 68Q45 68Q85 PDFBibTeX XMLCite \textit{P. A. Abdulla}, Lect. Notes Comput. Sci. 3829, 95--97 (2005; Zbl 1175.68254) Full Text: DOI
Desmedt, Yvo; Wang, Yongge; Burmester, Mike A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback. (English) Zbl 1173.68325 Deng, Xiaotie (ed.) et al., Algorithms and computation. 16th international symposium, ISAAC 2005, Sanya, Hainan, China, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30935-7/pbk). Lecture Notes in Computer Science 3827, 277-287 (2005). MSC: 68M10 68M12 68M14 94A62 PDFBibTeX XMLCite \textit{Y. Desmedt} et al., Lect. Notes Comput. Sci. 3827, 277--287 (2005; Zbl 1173.68325) Full Text: DOI
Liskov, Barbara; Rodrigues, Rodrigo Byzantine clients rendered harmless. (English) Zbl 1171.68378 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 487-489 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{B. Liskov} and \textit{R. Rodrigues}, Lect. Notes Comput. Sci. 3724, 487--489 (2005; Zbl 1171.68378) Full Text: DOI
Nadav, Uri; Naor, Moni The dynamic And-Or quorum system. (English) Zbl 1171.68382 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 472-486 (2005). MSC: 68M14 68M12 68Q25 PDFBibTeX XMLCite \textit{U. Nadav} and \textit{M. Naor}, Lect. Notes Comput. Sci. 3724, 472--486 (2005; Zbl 1171.68382) Full Text: DOI
Blesa, Maria J. Deciding stability in packet-switched FIFO networks under the adversarial queuing model in polynomial time. (English) Zbl 1171.68351 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 429-441 (2005). MSC: 68M12 68M20 PDFBibTeX XMLCite \textit{M. J. Blesa}, Lect. Notes Comput. Sci. 3724, 429--441 (2005; Zbl 1171.68351) Full Text: DOI
Zieliński, Piotr Optimistic generic broadcast. (English) Zbl 1171.68385 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 369-383 (2005). MSC: 68M14 68M12 68M15 PDFBibTeX XMLCite \textit{P. Zieliński}, Lect. Notes Comput. Sci. 3724, 369--383 (2005; Zbl 1171.68385) Full Text: DOI
Herlihy, Maurice; Sun, Ye Distributed transactional memory for metric-space networks. (English) Zbl 1171.68375 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 324-338 (2005). MSC: 68M14 68M12 PDFBibTeX XMLCite \textit{M. Herlihy} and \textit{Y. Sun}, Lect. Notes Comput. Sci. 3724, 324--338 (2005; Zbl 1171.68375) Full Text: DOI
Malkhi, Dahlia; Oprea, Florin; Zhou, Lidong \(\Omega\) meets Paxos: leader election and stability without eventual timely links. (English) Zbl 1171.68379 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 199-213 (2005). MSC: 68M14 68M12 68Q85 PDFBibTeX XMLCite \textit{D. Malkhi} et al., Lect. Notes Comput. Sci. 3724, 199--213 (2005; Zbl 1171.68379) Full Text: DOI
Aiyer, Amitanand; Alvisi, Lorenzo; Bazzi, Rida A. On the availability of non-strict quorum systems. (English) Zbl 1171.68361 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 48-62 (2005). MSC: 68M14 68M12 68M20 PDFBibTeX XMLCite \textit{A. Aiyer} et al., Lect. Notes Comput. Sci. 3724, 48--62 (2005; Zbl 1171.68361) Full Text: DOI
Badishi, Gal; Herzberg, Amir; Keidar, Idit Keeping denial-of-service attackers in the dark. (English) Zbl 1171.68349 Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 18-32 (2005). MSC: 68M12 68M14 68M20 PDFBibTeX XMLCite \textit{G. Badishi} et al., Lect. Notes Comput. Sci. 3724, 18--32 (2005; Zbl 1171.68349) Full Text: DOI
He, Jifeng; Li, Xiaoshan; Liu, Zhiming Component-based software engineering. (English) Zbl 1169.68366 Dang Van Hung (ed.) et al., Theoretical aspects of computing – ICTAC 2005. Second international colloquium, Hanoi, Vietnam, October 17–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29107-5/pbk). Lecture Notes in Computer Science 3722, 70-95 (2005). MSC: 68N30 PDFBibTeX XMLCite \textit{J. He} et al., Lect. Notes Comput. Sci. 3722, 70--95 (2005; Zbl 1169.68366) Full Text: DOI
Heckel, Reiko Stochastic analysis of graph transformation systems: A case study in P2P networks. (English) Zbl 1169.68451 Dang Van Hung (ed.) et al., Theoretical aspects of computing – ICTAC 2005. Second international colloquium, Hanoi, Vietnam, October 17–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29107-5/pbk). Lecture Notes in Computer Science 3722, 53-69 (2005). MSC: 68Q42 68M12 68R10 PDFBibTeX XMLCite \textit{R. Heckel}, Lect. Notes Comput. Sci. 3722, 53--69 (2005; Zbl 1169.68451) Full Text: DOI
Buchholtz, Mikael Automated analysis of infinite scenarios. (English) Zbl 1151.68326 De Nicola, Rocco (ed.) et al., Trustworthy global computing. International symposium, TGC 2005, Edinburgh, UK, April 7–9, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-30007-4/pbk). Lecture Notes in Computer Science 3705, 334-352 (2005). MSC: 68M12 PDFBibTeX XMLCite \textit{M. Buchholtz}, Lect. Notes Comput. Sci. 3705, 334--352 (2005; Zbl 1151.68326) Full Text: DOI
Qi, Fang; Jia, Weijia; Bao, Feng; Wu, Yongdong Batching SSL/TLS handshake improved. (English) Zbl 1122.94438 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 402-413 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{F. Qi} et al., Lect. Notes Comput. Sci. 3783, 402--413 (2005; Zbl 1122.94438) Full Text: DOI
Wang, Pan; Ning, Peng; Reeves, Douglas S. Network access control for mobile ad-hoc networks. (English) Zbl 1122.68435 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 350-362 (2005). MSC: 68P25 68M12 PDFBibTeX XMLCite \textit{P. Wang} et al., Lect. Notes Comput. Sci. 3783, 350--362 (2005; Zbl 1122.68435) Full Text: DOI