Search - IFIP Open Digital Library Access content directly

Filter your results

14 results
Structure: Internal structure identifier : 310035
Image document

A Safe Stopping Protocol to Enable Reliable Reconfiguration for Component-Based Distributed Systems

Mohammad Ghafari , Abbas Heydarnoori , Hassan Haghighi
6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.100-109, ⟨10.1007/978-3-319-24644-4_7⟩
Conference papers hal-01446613v1
Image document

A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage

Mihir R. Gohel , Bhavesh N. Gohil
6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.240-246, ⟨10.1007/978-3-642-29852-3_19⟩
Conference papers hal-01517664v1
Image document

A Mapping from Normative Requirements to Event-B to Facilitate Verified Data-Centric Business Process Management

Iman Poernomo , Timur Umarov
4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.136-149, ⟨10.1007/978-3-642-28038-2_11⟩
Conference papers hal-01527384v1
Image document

Another Fallen Hash-Based RFID Authentication Protocol

Julio Cesar Hernandez-Castro , Pedro Peris-Lopez , Masoumeh Safkhani , Nasour Bagheri , Majid Naderi
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.29-37, ⟨10.1007/978-3-642-30955-7_4⟩
Conference papers hal-01534308v1
Image document

Robots’ Cooperation for Finding a Target in Streets

Mohammad Abouei Mehrizi , Mohammad Ghodsi , Azadeh Tabatabaei
1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.30-43, ⟨10.1007/978-3-319-28678-5_3⟩
Conference papers hal-01446262v1
Image document

Improved Algorithms for Distributed Balanced Clustering

Kian Mirjalali , Hamid Zarrabi-Zadeh
3rd International Conference on Topics in Theoretical Computer Science (TTCS), Jul 2020, Tehran, Iran. pp.72-84, ⟨10.1007/978-3-030-57852-7_6⟩
Conference papers hal-03165380v1
Image document

Topics in Theoretical Computer Science

Luis Barbosa , Mohammad Ali Abam
Springer International Publishing, LNCS-12281, 2020, Lecture Notes in Computer Science, 978-3-030-57851-0. ⟨10.1007/978-3-030-57852-7⟩
Books hal-03165376v1
Image document

Model Checking MANETs with Arbitrary Mobility

Fatemeh Ghassemi , Saeide Ahmadi , Wan Fokkink , Ali Movaghar
5th International Conference on Fundamentals of Software Engineering (FSEN), Apr 2013, Tehran, Iran. pp.217-232, ⟨10.1007/978-3-642-40213-5_14⟩
Conference papers hal-01514658v1
Image document

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

Mohammad Hassan Habibi , Mahdi R. Alagheband , Mohammad Reza Aref
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.254-263, ⟨10.1007/978-3-642-21040-2_18⟩
Conference papers hal-01573311v1
Image document

Computing Boundary Cycle of a Pseudo-Triangle Polygon from Its Visibility Graph

Hossein Boomari , Soheila Farokhi
3rd International Conference on Topics in Theoretical Computer Science (TTCS), Jul 2020, Tehran, Iran. pp.61-71, ⟨10.1007/978-3-030-57852-7_5⟩
Conference papers hal-03165378v1
Image document

Bug Localization Using Revision Log Analysis and Open Bug Repository Text Categorization

Amir H. Moin , Mohammad Khansari
6th International IFIP WG 2.13 Conference on Open Source Systems,(OSS), May 2010, Notre Dame, United States. pp.188-199, ⟨10.1007/978-3-642-13244-5_15⟩
Conference papers hal-01056055v1
Image document

Visibility Graphs of Anchor Polygons

Hossein Boomari , Alireza Zarei
1st International Conference on Theoretical Computer Science (TTCS), Aug 2015, Tehran, Iran. pp.72-89, ⟨10.1007/978-3-319-28678-5_6⟩
Conference papers hal-01446265v1
Image document

A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks

Mahdi R. Alagheband , Mohammad Reza Aref
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.18-31, ⟨10.1007/978-3-642-24712-5_2⟩
Conference papers hal-01596197v1
Image document

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing

Abbas Taheri Soodejani , Mohammad Ali Hadavi , Rasool Jalili
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.263-273, ⟨10.1007/978-3-642-31540-4_20⟩
Conference papers hal-01534772v1