Sciweavers

2421 search results - page 195 / 485
» Message from the Editor-in-Chief
Sort
View
CONCUR
2005
Springer
15 years 7 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
EDCC
2005
Springer
15 years 7 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
IFIP
2005
Springer
15 years 7 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen
IPSN
2005
Springer
15 years 7 months ago
A robust architecture for distributed inference in sensor networks
— Many inference problems that arise in sensor networks require the computation of a global conclusion that is consistent with local information known to each node. A large class...
Mark A. Paskin, Carlos Guestrin, Jim McFadden
PADS
2004
ACM
15 years 7 months ago
Batch Based Cancellation: A Rollback Optimal Cancellation Scheme in Time Warp Simulations
An efficient cancellation scheme is essential to the performance of Time Warp simulations. The pitfalls of rollback echoes, chasing hazards and cascading rollbacks can be identiï¬...
Yi Zeng, Wentong Cai, Stephen John Turner