You are here

Bibliography

Export 58 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is M  [Clear All Filters]
2003
Conrad M, Schöller M, Fuhrmann T, Bocksch G, Zitterbart M. Multiple language family support for programmable network systems. In: In Proceedings of the 5th Annual International Working Conference on Active Networks (IWAN. In Proceedings of the 5th Annual International Working Conference on Active Networks (IWAN. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.3301
2001
Cramer R, Damgárd I, Nielsen JB. Multiparty Computation from Threshold Homomorphic Encryption. In: Pfitzmann B Advances in Cryptology — EUROCRYPT 2001. Vol. 2045. Advances in Cryptology — EUROCRYPT 2001. Springer Berlin Heidelberg; 2001. pp. 280-300. Available from: http://dx.doi.org/10.1007/3-540-44987-6_18
2007
Nishide T, Ohta K. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. In: Okamoto T, Wang X Public Key Cryptography – PKC 2007. Vol. 4450. Public Key Cryptography – PKC 2007. Springer Berlin Heidelberg; 2007. pp. 343-360. Available from: http://dx.doi.org/10.1007/978-3-540-71677-8_23
2004
Chandra R, Bahl V, Bahl P. MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. In: INFOCOM. INFOCOM. ; 2004. Available from: http://www.pubzone.org/dblp/conf/infocom/ChandraBB04
Aberer K, Datta A, Hauswirth M. Multifaceted Simultaneous Load Balancing in DHT-based P2P systems: A new game with old balls and bins. In: Self-* Properties in Complex Information Systems, “Hot Topics” series, LNCS. Self-* Properties in Complex Information Systems, “Hot Topics” series, LNCS. Springer; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.3746
2003
Li X, Kim YJ, Govindan R, Hong W. Multi-dimensional range queries in sensor networks. In: Proceedings of the 1st international conference on Embedded networked sensor systems. Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM; 2003. pp. 63–75. Available from: http://doi.acm.org/10.1145/958491.958500
2003
Steinbrecher S, Köpsell S. Modelling Unlinkability. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 32–47. Available from: http://www.springerlink.com/content/dxteg659uf2jtdd7/
2004
Qiu D, Srikant R. Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: SIGCOMM'04. Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. SIGCOMM'04. Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Portland, Oregon, USA: ACM; 2004. pp. 367–378. Available from: http://doi.acm.org/10.1145/1015467.1015508
2002
Hand S, Roscoe T. Mnemosyne: Peer-to-Peer Steganographic Storage. In: Druschel P, Kaashoek F, Rowstron A Peer-to-Peer Systems. Vol. 2429. Peer-to-Peer Systems. Springer Berlin Heidelberg; 2002. pp. 130-140. Available from: http://dx.doi.org/10.1007/3-540-45748-8_13
2003
Danezis G. Mix-networks with Restricted Routes. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 1–17. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.1188
2005
Camenisch J, Mityagin A. Mix-network with Stronger Security. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 128–147. Available from: http://www.springerlink.com/content/v32m5122127m78v0/
2003
Danezis G, Dingledine R, Mathewson N. Mixminion: Design of a Type III Anonymous Remailer Protocol. In: In Proceedings of the 2003 IEEE Symposium on Security and Privacy. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. ; 2003. pp. 2–15. Available from: http://mixminion.net/minion-design.pdf
Möller U, Cottrell L, Palfrader P, Sassaman L. Mixmaster Protocol –- Version 2. 2003 .
1996
Gulcu C, Tsudik G. Mixing email with babel. In: Symposium on Network and Distributed System Security. Symposium on Network and Distributed System Security. ; 1996. pp. 2–16. Available from: http://eprints.kfupm.edu.sa/50994/1/50994.pdf
Fargier H, Lang J, Schiex T. Mixed constraint satisfaction: a framework for decision problems under incomplete knowledge. In: AAAI'96 - Proceedings of the 13th National Conference on Artificial Intelligence. AAAI'96 - Proceedings of the 13th National Conference on Artificial Intelligence. Portland, OR, United States: AAAI Press; 1996. pp. 175–180. Available from: http://dl.acm.org/citation.cfm?id=1892875.1892901
2004
Danezis G, Laurie B. Minx: A simple and efficient anonymous packet format. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA: ACM New York, NY, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029179.1029198

Pages