Sciweavers

4305 search results - page 268 / 861
» Analysing Protocol Implementations
Sort
View
LADC
2005
Springer
15 years 8 months ago
Group-Based Replication of On-Line Transaction Processing Servers
Several techniques for database replication using group communication have recently been proposed, namely, the Database State Machine, PostgresR, and the NODO protocol. Although a...
Alfrânio Correia Jr., A. Sousa, L. Soares, J...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 6 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
122
Voted
FC
2000
Springer
106views Cryptology» more  FC 2000»
15 years 6 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
KESAMSTA
2010
Springer
15 years 28 days ago
Modeling and Verifying Business Interactions via Commitments and Dialogue Actions
A variety of business interactions in open environments can be captured in terms of creation and manipulation of social commitments among the agents. Such interactions include B2B ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
VTC
2010
IEEE
180views Communications» more  VTC 2010»
15 years 26 days ago
Dynamic Channel Reservation to Enhance Channel Access by Exploiting Structure of Vehicular Networks
Abstract—VANET protocols need to exploit the special structure of vehicular networks. This structure includes the onedimensional nature of roads, the structure of lanes, the grou...
Ray K. Lam, P. R. Kumar