Protocols

Results: 23793



#Item
1Zero-Knowledge Protocols for Search Problems Ben Berger Zvika Brakerski Weizmann Institute of Science, Israel∗  Abstract

Zero-Knowledge Protocols for Search Problems Ben Berger Zvika Brakerski Weizmann Institute of Science, Israel∗ Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-14 10:13:17
2Experimental Biological Protocols with Formal Semantics Alessandro Abate2 , Luca Cardelli1,2 , Marta Kwiatkowska2 , Luca Laurenti2 , and Boyan Yordanov1 1

Experimental Biological Protocols with Formal Semantics Alessandro Abate2 , Luca Cardelli1,2 , Marta Kwiatkowska2 , Luca Laurenti2 , and Boyan Yordanov1 1

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2018-06-22 10:21:17
3Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2018-04-25 11:34:42
4Blockchain For Financial Markets Applications and Services  Harnessing the Power of Artificial Intelligence, Neural Networks and Active Leverage “At its core Qompass will provide a rich ecosystem of API protocols and

Blockchain For Financial Markets Applications and Services Harnessing the Power of Artificial Intelligence, Neural Networks and Active Leverage “At its core Qompass will provide a rich ecosystem of API protocols and

Add to Reading List

Source URL: icorating.com

Language: English
5DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Before: A Federated Internet The Internet and its protocols were designed to be federated

DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Before: A Federated Internet The Internet and its protocols were designed to be federated

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2018-06-18 15:29:57
6Toward a Taxonomy and Attacker Model for Secure Routing Protocols Matthias Hollick Cristina Nita-Rotaru

Toward a Taxonomy and Attacker Model for Secure Routing Protocols Matthias Hollick Cristina Nita-Rotaru

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
7Verifying Team Formation Protocols with Probabilistic Model Checking? Taolue Chen, Marta Kwiatkowska, David Parker, and Aistis Simaitis Department of Computer Science, University of Oxford, Wolfson Building, Parks Road,

Verifying Team Formation Protocols with Probabilistic Model Checking? Taolue Chen, Marta Kwiatkowska, David Parker, and Aistis Simaitis Department of Computer Science, University of Oxford, Wolfson Building, Parks Road,

Add to Reading List

Source URL: www.prismmodelchecker.org

Language: English - Date: 2012-05-10 09:21:45
8Enabling SDN in old school networks with Software-Controlled Routing Protocols Laurent Vanbever† and Stefano Vissicchio†† ?  Princeton University† , Universit´e catholique de Louvain††

Enabling SDN in old school networks with Software-Controlled Routing Protocols Laurent Vanbever† and Stefano Vissicchio†† ? Princeton University† , Universit´e catholique de Louvain††

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:55:37
9Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
10Proceedings on Privacy Enhancing Technologies ; ):1–18  Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English