Sciweavers

361 search results - page 42 / 73
» Composition of Password-Based Protocols
Sort
View
136
Voted
AINA
2009
IEEE
15 years 10 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
ASIACRYPT
2007
Springer
15 years 10 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
153
Voted
SEMWEB
2004
Springer
15 years 9 months ago
Semantic Web Service Interaction Protocols: An Ontological Approach
A central requirement for achieving the vision of run-time discovery and dynamic composition of services is the provision of appropriate descriptions of the operation of a service,...
Ronald Ashri, Grit Denker, Darren Marvin, Mike Sur...
130
Voted
CORR
2008
Springer
101views Education» more  CORR 2008»
15 years 3 months ago
Sublinear Communication Protocols for Multi-Party Pointer Jumping and a Related Lower Bound
We study the one-way number-on-the-forehead (NOF) communication complexity of the k-layer pointer jumping problem with n vertices per layer. This classic problem, which has connec...
Joshua Brody, Amit Chakrabarti
136
Voted
IJNSEC
2008
132views more  IJNSEC 2008»
15 years 3 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller