A protocol for the reliable multicast of data to mobile hosts is described. A logical ring is maintained between all the base stations that handle the multicast traffic of the sam...
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
An agent communication protocol specifies the “rules of encounter” governing a dialogue between agents in a multiagent system. In non-cooperative interactions (such as negoti...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...
This paper describes our preliminary analysis on the induction of communication protocols. Our work has two goals: (i) to recognize rules (i.e. protocols) from the communicative b...