Protocols

Results: 23793



#Item
1Complexity classes / Cryptography / Computational complexity theory / Computing / Interactive proof system / Zero-knowledge proof / NP / IP / Soundness / Proof of secure erasure / Certificate / Zero knowledge

Zero-Knowledge Protocols for Search Problems Ben Berger Zvika Brakerski Weizmann Institute of Science, Israel∗ Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-14 10:13:17
2Mathematics / Mathematical analysis / Theoretical computer science / Distribution / Functional analysis / Substitution / Denotational semantics / Markov chain

Experimental Biological Protocols with Formal Semantics Alessandro Abate2 , Luca Cardelli1,2 , Marta Kwiatkowska2 , Luca Laurenti2 , and Boyan Yordanov1 1

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2018-06-22 10:21:17
3Algorithm / Mathematical logic / Theoretical computer science / IP / Model checking / Mathematics / Machine learning

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2018-04-25 11:34:42
4Cryptocurrencies / Blockchains / Computing / Alternative currencies / Concurrent computing / Distributed computing / Ethereum / Cross-platform software / Smart contract / Bitcoin / Hyperledger / ternity

Blockchain For Financial Markets Applications and Services Harnessing the Power of Artificial Intelligence, Neural Networks and Active Leverage “At its core Qompass will provide a rich ecosystem of API protocols and

Add to Reading List

Source URL: icorating.com

Language: English
5Computing / Cloud infrastructure / Cloud computing / IT infrastructure / Serverless computing / Information and communications technology / Email

DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Before: A Federated Internet The Internet and its protocols were designed to be federated

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2018-06-18 15:29:57
6Internet architecture / Computing / Information and communications technology / Network architecture / Routing / IP routing / Computer network / Router / Source routing / Wireless ad hoc network / Control plane / Link-state routing protocol

Toward a Taxonomy and Attacker Model for Secure Routing Protocols Matthias Hollick Cristina Nita-Rotaru

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
7Probability / Dynamic programming / Markov decision process / Stochastic control / PRISM model checker / Reinforcement learning / Probabilistic CTL / Application software

Verifying Team Formation Protocols with Probabilistic Model Checking? Taolue Chen, Marta Kwiatkowska, David Parker, and Aistis Simaitis Department of Computer Science, University of Oxford, Wolfson Building, Parks Road,

Add to Reading List

Source URL: www.prismmodelchecker.org

Language: English - Date: 2012-05-10 09:21:45
8Computing / Network architecture / Information and communications technology / Internet architecture / Routing protocols / Routing / Internet Standards / Computer networking / Software-defined networking / OpenFlow / Router / Interior gateway protocol

Enabling SDN in old school networks with Software-Controlled Routing Protocols Laurent Vanbever† and Stefano Vissicchio†† ? Princeton University† , Universit´e catholique de Louvain††

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:55:37
9Algorithm / Mathematical logic / Theoretical computer science / IP / Model checking / Mathematics / Machine learning

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
10Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
UPDATE