×

Found 277 Documents (Results 1–100)

On correctness of dynamic protocol update. (English) Zbl 1461.68033

Steffen, Martin (ed.) et al., Formal methods for open object-based distributed systems. 7th IFIP WG 6.1 international conference, FMOODS 2005, Athens, Greece, June 15–17, 2005. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3535, 275-289 (2005).
MSC:  68M12
PDFBibTeX XMLCite
Full Text: DOI

Reliable broadcast in unknown fixed-identity networks. (English) Zbl 1314.68050

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 342-351 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Simultaneous broadcast revisited. (English) Zbl 1314.68158

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 324-333 (2005).
PDFBibTeX XMLCite
Full Text: DOI

On the establishment of distinct identities in overlay networks. (English) Zbl 1314.68039

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 312-320 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Correctness of a gossip based membership protocol. (English) Zbl 1314.68038

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 292-301 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Adaptive routing with stale information. (English) Zbl 1314.68040

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 276-283 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Competitive weighted throughput analysis of greedy protocols on DAGs. (English) Zbl 1314.68042

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 227-236 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Routing complexity of faulty networks. (English) Zbl 1314.68150

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 209-217 (2005).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Consensus and collision detectors in wireless ad hoc networks. (English) Zbl 1314.68368

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 197-206 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Efficient lookup on unstructured topologies. (English) Zbl 1314.68385

Proceedings of the 24th annual ACM symposium on principles of distributed computing, PODC ’05, Las Vegas, NV, USA, July 17–20, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-994-2). 77-86 (2005).
PDFBibTeX XMLCite
Full Text: DOI Link

Distributed online call control on general networks. (English) Zbl 1297.68035

Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23–25, 2005. New York, NY: ACM Press (ISBN 0-89871-585-7). 791-800 (2005).
MSC:  68M14 68M12 68W27
PDFBibTeX XMLCite

Fast convergence of selfish rerouting. (English) Zbl 1297.68034

Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23–25, 2005. New York, NY: ACM Press (ISBN 0-89871-585-7). 772-781 (2005).
MSC:  68M14 68M12
PDFBibTeX XMLCite

Collecting correlated information from a sensor network. (English) Zbl 1297.68032

Proceedings of the sixteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2005, Vancouver, BC, Canada, January 23–25, 2005. New York, NY: ACM Press (ISBN 0-89871-585-7). 479-488 (2005).
MSC:  68M14 68M12 94A15
PDFBibTeX XMLCite

A mathematical model of dialog. (English) Zbl 1276.68151

Goldin, Dina (ed.) et al., Proceedings of the workshop on the foundations of interactive computation (FInCo 2005), Edinburgh, UK, April 9, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 141, No. 5, 33-48 (2005).
MSC:  68T42
PDFBibTeX XMLCite
Full Text: Link

Analysing the BKE-security protocol with \(\mu\)CRL. (English) Zbl 1272.68224

Ulidowski, Irek (ed.), Proceedings of ARTS 2004, the 6th AMAST workshop on real-time systems (ARTS 2004), Stirling, UK, July 12, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 139, No. 1, 49-90 (2005).
MSC:  68Q60 68M12 94A60
PDFBibTeX XMLCite
Full Text: Link

Static validation of a voting protocol. (English) Zbl 1272.94086

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 115-134 (2005).
MSC:  94A62 68M12 68Q60
PDFBibTeX XMLCite
Full Text: Link

Formalizing and analyzing the Needham-Schroeder symmetric-key protocol by rewriting. (English) Zbl 1272.94085

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 95-114 (2005).
MSC:  94A62 68M12 68Q42
PDFBibTeX XMLCite
Full Text: Link

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. (English) Zbl 1272.94082

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 79-94 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: Link

A syntactic criterion for injectivity of authentication protocols. (English) Zbl 1272.94077

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 23-38 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: Link

Deconstructing Alice and Bob. (English) Zbl 1272.68052

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 3-22 (2005).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: Link

Propositional statecharts for agent interaction protocols. (English) Zbl 1272.68055

Rodgers, P. (ed.), Proceedings of the first international workshop on Euler diagrams (Euler 2004), University of Brighton, Brighton, UK, September 22–23, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 134, 55-75 (2005).
MSC:  68M12
PDFBibTeX XMLCite
Full Text: Link

Probabilistic model checking of the CSMA/CD protocol using PRISM and APMC. (English) Zbl 1272.68242

Huth, Michael R. A. (ed.), Proceedings of the fourth international workshop on automated verification of critical systems (AVoCS 2004), London, UK, September 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 128, No. 6, 195-214 (2005).
MSC:  68Q60 68M12
PDFBibTeX XMLCite
Full Text: Link

Toward reasoning about security protocols: a semantic approach. (English) Zbl 1272.68059

van der Hoek, Wiebe (ed.) et al., Proceedings of the 2nd international workshop on logic and communication in multi-agent systems, LCMAS, Nancy, France, August, 16–20, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 126, 53-75 (2005).
PDFBibTeX XMLCite
Full Text: Link

The ASW protocol revisited: a unified view. (English) Zbl 1272.68056

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 145-161 (2005).
MSC:  68M12 68Q60 94A62
PDFBibTeX XMLCite
Full Text: Link

Attacking group multicast key management protocols using Coral. (English) Zbl 1272.68060

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 125-144 (2005).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: Link

An optimized intruder model for SAT-based model-checking of security protocols. (English) Zbl 1272.68047

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 91-108 (2005).
MSC:  68M12 68Q60 94A60
PDFBibTeX XMLCite
Full Text: Link

Metareasoning about security protocols using distributed temporal logic. (English) Zbl 1272.68051

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 67-89 (2005).
MSC:  68M12 03B44
PDFBibTeX XMLCite
Full Text: Link

Deciding the security of protocols with commuting public key encryption. (English) Zbl 1272.94022

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 55-66 (2005).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: Link

On the relative soundness of the free algebra model for public key encryption. (English) Zbl 1272.94049

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 43-54 (2005).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: Link

Synthesising efficient and effective security protocols. (English) Zbl 1272.68057

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 25-41 (2005).
MSC:  68M12 68T20
PDFBibTeX XMLCite
Full Text: Link

Extending security protocol analysis: new challenges. (English) Zbl 1272.68050

Armando, A. (ed.) et al., Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 125, No. 1, 13-24 (2005).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: Link

A quantitative study of two attacks. (English) Zbl 1272.68049

Busi, N. (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 121, 65-85 (2005).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: Link

Analysing password protocol security against off-line dictionary attacks. (English) Zbl 1272.68053

Busi, N. (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 121, 47-63 (2005).
MSC:  68M12 68Q85 94A62
PDFBibTeX XMLCite
Full Text: Link

A coordination-based methodology for security protocol verification. (English) Zbl 1272.68048

Busi, N. (ed.) et al., Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 121, 23-46 (2005).
MSC:  68M12 68Q85
PDFBibTeX XMLCite
Full Text: Link

Scenarios and covert channels: another game…. (English) Zbl 1272.68058

de Alfaro, L. (ed.), Proceedings of the workshop on games in design and verification (GDV 2004), Boston, MA, USA, June 18, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 119, No. 1, 93-116 (2005).
MSC:  68M12 91A80
PDFBibTeX XMLCite
Full Text: Link

Towards a game theoretic understanding of ad-hoc routing. (English) Zbl 1272.68045

de Alfaro, L. (ed.), Proceedings of the workshop on games in design and verification (GDV 2004), Boston, MA, USA, June 18, 2004. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 119, No. 1, 67-92 (2005).
MSC:  68M10 68M12 91A80
PDFBibTeX XMLCite
Full Text: Link

Verifying a UMTS protocol using Spin and EASN. (English) Zbl 1272.68270

Etalle, S. (ed.) et al., Proceedings of the international workshop on software verification and validation (SVV 2003), Mumbai, India, December 9–13, 2003. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 118, 71-85 (2005).
MSC:  68Q60 68M12
PDFBibTeX XMLCite
Full Text: Link

Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. (English) Zbl 1272.68016

Electronic Notes in Theoretical Computer Science 135, No. 1. Amsterdam: Elsevier. 134 p., electronic only (2005).
MSC:  68-06 68M12 68T15 94A60 94A62 00B25
PDFBibTeX XMLCite
Full Text: Link

Proceedings of the 2nd international workshop on security issues with Petri nets and other computational models (WISP 2004), Bologna, Italy, June 26, 2004. (English) Zbl 1271.68027

Electronic Notes in Theoretical Computer Science 121. Amsterdam: Elsevier. 156 p., electronic only (2005).
PDFBibTeX XMLCite
Full Text: Link

Proceedings of the workshop on automated reasoning for security protocol analysis (ARSPA 2004), Cork, Ireland, July 4, 2004. (English) Zbl 1271.68018

Electronic Notes in Theoretical Computer Science 125, No. 1. Amsterdam: Elsevier. 161 p., electronic only (2005).
MSC:  68-06 94-06 68M12 68T15 00B25
PDFBibTeX XMLCite
Full Text: Link

Key agreement from weak bit agreement. (English) Zbl 1192.94099

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 664-673 (2005).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Concurrent general composition of secure protocols in the timing model. (English) Zbl 1192.94121

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 644-653 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Collusion-free protocols. (English) Zbl 1192.94122

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 543-552 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

New and improved constructions of non-malleable cryptographic protocols. (English) Zbl 1192.94104

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 533-542 (2005).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI Link

Covert two-party computation. (English) Zbl 1192.94111

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 513-522 (2005).
MSC:  94A60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Fast quantum byzantine agreement (extended abstract). (English) Zbl 1192.81053

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 481-485 (2005).
PDFBibTeX XMLCite
Full Text: DOI

The round complexity of two-party random selection. (English) Zbl 1192.68281

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 338-347 (2005).
MSC:  68Q10 68M12 68Q25
PDFBibTeX XMLCite
Full Text: DOI Link

Oblivious routing in directed graphs with random demands. (English) Zbl 1192.90229

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 193-201 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Errors in computational complexity proofs for protocols. (English) Zbl 1154.68334

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 624-643 (2005).
MSC:  68M12 68Q25 94A62
PDFBibTeX XMLCite
Full Text: DOI

A simple threshold authenticated key exchange from short secrets. (English) Zbl 1154.94446

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 566-584 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Updatable zero-knowledge databases. (English) Zbl 1154.94468

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 174-198 (2005).
MSC:  94A62 68P15
PDFBibTeX XMLCite
Full Text: DOI

New monotones and lower bounds in unconditional two-party computation. (English) Zbl 1145.94476

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 467-477 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Secure computation of constant-depth circuits with applications to database search problems. (English) Zbl 1145.68396

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 395-411 (2005).
MSC:  68P15 68M12 94A62 94C10
PDFBibTeX XMLCite
Full Text: DOI

Self-stabilization in spite of frequent changes of networks: case study of mutual exclusion on dynamic rings. (English) Zbl 1172.68369

Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 183-197 (2005).
MSC:  68M14 68M12
PDFBibTeX XMLCite
Full Text: DOI

Self-stabilization preserving compiler. (Extended abstract). (English) Zbl 1172.68361

Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 81-95 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Self-stabilization with \(r\)-operators revisited. (English) Zbl 1172.68360

Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 68-80 (2005).
PDFBibTeX XMLCite
Full Text: DOI

A snap-stabilizing DFS with a lower space requirement. (English) Zbl 1172.68358

Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 33-47 (2005).
MSC:  68M14 68M12
PDFBibTeX XMLCite
Full Text: DOI

Synchronous vs. asynchronous unison. (English) Zbl 1172.68357

Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 18-32 (2005).
MSC:  68M14 68M12
PDFBibTeX XMLCite
Full Text: DOI

Snap-stabilizing optimal binary search tree. (English) Zbl 1172.68355

Herman, Ted (ed.) et al., Self-stabilizing systems. 7th international symposium, SSS 2005, Barcelona, Spain, October 26–27, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29814-2/pbk). Lecture Notes in Computer Science 3764, 1-17 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Building reliable mix networks with fair exchange. (English) Zbl 1126.68413

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 378-392 (2005).
MSC:  68P25 94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Off-line karma: A decentralized currency for peer-to-peer and grid applications. (English) Zbl 1126.68394

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 364-377 (2005).
MSC:  68P25 94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient and leakage-resilient authenticated key transport protocol based on RSA. (English) Zbl 1126.68415

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 269-284 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Construction algorithms and approximation bounds for the streaming cache placement problem in multicast networks. (English. Russian original) Zbl 1102.68733

Cybern. Syst. Anal. 41, No. 6, 898-908 (2005); translation from Kibern. Sist. Anal. 2005, No. 6, 124-137 (2005).
MSC:  68W25 68M10 68M12
PDFBibTeX XMLCite
Full Text: DOI

Verification of parameterized timed systems. (English) Zbl 1175.68254

Pettersson, Paul (ed.) et al., Formal modeling and analysis of timed systems. Third international conference, FORMATS 2005, Uppsala, Sweden, September 26–28, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30946-2/pbk). Lecture Notes in Computer Science 3829, 95-97 (2005).
PDFBibTeX XMLCite
Full Text: DOI

A complete characterization of tolerable adversary structures for secure point-to-point transmissions without feedback. (English) Zbl 1173.68325

Deng, Xiaotie (ed.) et al., Algorithms and computation. 16th international symposium, ISAAC 2005, Sanya, Hainan, China, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30935-7/pbk). Lecture Notes in Computer Science 3827, 277-287 (2005).
PDFBibTeX XMLCite
Full Text: DOI

Byzantine clients rendered harmless. (English) Zbl 1171.68378

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 487-489 (2005).
MSC:  68M14 68M12
PDFBibTeX XMLCite
Full Text: DOI

Deciding stability in packet-switched FIFO networks under the adversarial queuing model in polynomial time. (English) Zbl 1171.68351

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 429-441 (2005).
MSC:  68M12 68M20
PDFBibTeX XMLCite
Full Text: DOI

Distributed transactional memory for metric-space networks. (English) Zbl 1171.68375

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 324-338 (2005).
MSC:  68M14 68M12
PDFBibTeX XMLCite
Full Text: DOI

\(\Omega\) meets Paxos: leader election and stability without eventual timely links. (English) Zbl 1171.68379

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 199-213 (2005).
MSC:  68M14 68M12 68Q85
PDFBibTeX XMLCite
Full Text: DOI

On the availability of non-strict quorum systems. (English) Zbl 1171.68361

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 48-62 (2005).
MSC:  68M14 68M12 68M20
PDFBibTeX XMLCite
Full Text: DOI

Keeping denial-of-service attackers in the dark. (English) Zbl 1171.68349

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 18-32 (2005).
MSC:  68M12 68M14 68M20
PDFBibTeX XMLCite
Full Text: DOI

Stochastic analysis of graph transformation systems: A case study in P2P networks. (English) Zbl 1169.68451

Dang Van Hung (ed.) et al., Theoretical aspects of computing – ICTAC 2005. Second international colloquium, Hanoi, Vietnam, October 17–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29107-5/pbk). Lecture Notes in Computer Science 3722, 53-69 (2005).
MSC:  68Q42 68M12 68R10
PDFBibTeX XMLCite
Full Text: DOI

Batching SSL/TLS handshake improved. (English) Zbl 1122.94438

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 402-413 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Network access control for mobile ad-hoc networks. (English) Zbl 1122.68435

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 350-362 (2005).
MSC:  68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 3

Main Field

all top 3

Software