Sciweavers

3972 search results - page 84 / 795
» Design of the iSCSI Protocol
Sort
View
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 4 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
ATAL
2005
Springer
14 years 3 months ago
A software tool for the development of MAS communication protocols based on conversations
The work we present here is mainly concerned with interagent communication, MAS communication protocols and, in particular, software tools and environments to define, experiment a...
Madieyna Lamine Fall, Sylvain Delisle
MSN
2005
Springer
14 years 3 months ago
A Low Overhead Ad Hoc Routing Protocol with Route Recovery
Many routing protocols have been designed for Ad Hoc networks. However, most of these kinds of protocols are not able to react fast enough to maintain routing. In the paper, we pro...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Po Tsa...
TGC
2005
Springer
14 years 3 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
ESAW
2003
Springer
14 years 3 months ago
Competent Agents and Customising Protocols
Abstract. In open agent societies, communication protocols and strategies cannot be assumed to always match perfectly, because they are typically specified by different designers...
Ulrich Endriss, Wenjin Lu, Nicolas Maudet, Kostas ...