Dissertations / Theses on the topic 'Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Full textThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Full textDowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Full textGibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.
Full textYang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.
Full textMaria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.
Full textThe purpose of this retrospective study was to evaluate all orthodontic treatment plannings conducted at the Orthodontic Department at Bauru Dental School, University of São Paulo, since 1973, in order to investigate extraction and nonextraction frequency protocols selected at each considered period. The sample comprised initially 3745 records of treated patients, that according to exclusion criteria, reduced the final sample to 3413 documentations. This total sample was evaluated according to the protocol choice, being divided into 10 groups: Protocol 0 (nonextraction group); Protocol 1 (4-first premolar extractions); Protocol 2 (2-maxillary first and 2-mandibular second premolar extractions); Protocol 3 (2-maxillary premolar extractions); Protocol 4 (4-second premolar extractions); Protocol 5 (asymmetric premolar extractions); Protocol 6 (incisor and canine extractions); Protocol 7 (first and second molar extractions); Protocol 8 (atypical extractions) and Protocol 9 (agenesis and previously missing teeth group). These 3413 obtained protocols were divided into seven 5-year intervals: Interval 1 (1973-1977); Interval 2 (1978-1982); Interval 3 (1983-1987); Interval 4 (1988-1992); Interval 5 (1993-1997); Interval 6 (1998-2002); Interval 7 (2003-2007). The frequency of each protocol was compared among the 7 intervals, using the Proportion Test, in order to identify some predominant trends at each tested period. The results showed that 7 frequency protocols were significantly different among the 7 considered intervals, evidencing that the protocols choice was influenced by some dominant philosophies or dogmas during the evaluated periods.
Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.
Full textIn a world strongly dependent on distributed data communication, the design of secure infrastructures is a crucial task. Distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal
坂部, 俊樹, 正彦 酒井, 圭一朗 草刈, and 直樹 西田. "Verifying Cryptographic Protocols." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10378.
Full textJaspan, Ciera N. C. "Proper Plugin Protocols." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/189.
Full textAttamah, M. K. "Epistemic gossip protocols." Thesis, University of Liverpool, 2015. http://livrepository.liverpool.ac.uk/3001317/.
Full textBedrax-Weiss, Tania. "Optimal search protocols /." view abstract or download file of text, 1999. http://wwwlib.umi.com/cr/uoregon/fullcit?p9948016.
Full textTypescript. Includes vita and abstract. Includes bibliographical references (leaves 206-211). Also available for download via the World Wide Web; free to University of Oregon users. Address: http://wwwlib.umi.com/cr/uoregon/fullcit?p9948016.
Njoya, Nadine Katia. "Contraction-Expansion Protocols." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/1971.
Full textShah, Munam Ali. "A novel MAC protocol for cognitive radio networks." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.
Full textKou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Muhammad, Shahabuddin. "EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3086.
Full textPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Scerri, Guillaume. "Proof of security protocols revisited." Thesis, Cachan, Ecole normale supérieure, 2015. http://www.theses.fr/2015DENS0002/document.
Full textWith the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the criticality and complexity of these protocols, there is an important need of formal verification.In order to obtain formal proofs of cryptographic protocols, two main attacker models exist: the symbolic model and the computational model. The symbolic model defines the attacker capabilities as a fixed set of rules. On the other hand, the computational model describes only the attacker's limitations by stating that it may break some hard problems. While the former is quiteabstract and convenient for automating proofs the later offers much stronger guarantees.There is a gap between the guarantees offered by these two models due to the fact the symbolic model defines what the adversary may do while the computational model describes what it may not do. In 2012 Bana and Comon devised a new symbolic model in which the attacker's limitations are axiomatised. In addition provided that the (computational semantics) of the axioms follows from the cryptographic hypotheses, proving security in this symbolic model yields security in the computational model.The possibility of automating proofs in this model (and finding axioms general enough to prove a large class of protocols) was left open in the original paper. In this thesis we provide with an efficient decision procedure for a general class of axioms. In addition we propose a tool (SCARY) implementing this decision procedure. Experimental results of our tool shows that the axioms we designed for modelling security of encryption are general enough to prove a large class of protocols
Kobeissi, Nadim. "Formal verification for real-world cryptographic protocols and implementations." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE065.
Full textIndividuals and organizations are increasingly relying on the Web and on user-facing applications for use cases such as online banking, secure messaging, document sharing and electronic voting. To protect the confidentiality and integrity of these communications, these systems depend on authentication and authorization protocols, on application-level cryptographic constructions and on transport-layer cryptographic protocols. However, combining these varied mechanisms to achieve high-level security goals is error-prone and has led to many attacks even on sophisticated and well-studied applications. This thesis aims to develop methods and techniques for reasoning about, designing and implementing cryptographic protocols and secure application components relevant to some of the most frequently used cryptographic protocols and applications. We investigate and formalize various notions of expected guarantees and evaluate whether some of the most popular secure channel protocols, such as secure messaging protocols and transport protocols often operating at the billion-user scale, are capable of meeting these goals. In this thesis, we ask: can existing major paradigms for formal protocol verification serve as guidelines for the assessment of existing protocols, the prototyping of protocols being designed, and the conception of entirely new protocols, in a way that is meaningful and reflective of their expected real-world properties? And can we develop novel frameworks for formal verification and more secure implementation based on these foundations? We propose new formal models in both symbolic and computational formal verification frameworks for these protocols and applications. In some of the presented work, we obtain a verification methodology that starts from the protocol and ends at the implementation code. In other parts of our work, we develop a dynamic framework for generating formal verification models for any secure channel protocol described in a lightweight syntax. Ultimately, this thesis presents formal verification approaches for existing protocols reaching towards their implementation as well as methods for prototyping and formally verifying new protocols as they are being drafted and designed
Sadrin, Stéphane. "Evaluation du bénéfice chez l'homme des probiotiques dans la prise en charge du syndrome de l'intestin irritable : méthodologie de l'essai contrôlé randomisé et allégations nutritionnelles et de santé." Thesis, Toulon, 2017. http://www.theses.fr/2017TOUL0007/document.
Full textA health claim across the EU requires clinical evidence about the efficacy and safety of a nutritionalsupplementation. Probiotics, especially lactic acid bacteria, fall within this regulatory framework inwhich EFSA indicates that the evidence from patients with functional gastrointestinal disorder aretransferable in a population of healthy subjects. The LAPIBSS protocol is a high-quality clinicaltrial assessing the efficacy of 2 strains of Lactobacillus acidophilus to reduce the irritable bowelsyndrome symptoms severity. Results confirm the safety of strains used but do not show asignificant decrease of symptoms compared with placebo after 8 weeks. The overall treatment effectis statistically significant on the flatus score. A placebo effect and the considerable heterogeneity ofsymptoms severity at baseline would explain our results. A better understanding of physiologicaleffects of probiotics in human would be needed to upgrade the rationale for their use in clinicalresearch
Wibling, Oskar. "Creating Correct Network Protocols." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-9361.
Full textSteine, Asgeir. "Privacy-Preserving Cryptographic Protocols." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-17284.
Full textWilliams, Douglas E. "Fault-tolerant authentication protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0020/NQ58112.pdf.
Full textClayton, Richard Vincent. "Structuring and destructuring protocols." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/8492.
Full textPapanikolaou, Nikolaos K. "Model checking quantum protocols." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/2236/.
Full textChang, Che-Hao Albert. "Reasoning about security protocols." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621505.
Full textLuo, Yi. "Spatio-temporal negotiation protocols." Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4972.
Full textID: 029808814; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2011.; Includes bibliographical references (p. 128-131).
Ph.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
Wei, K.-K. "Modelling of communication protocols." Thesis, University of York, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373307.
Full textPowell, Dave, and Paul Cook. "Community of Programming Protocols." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/606110.
Full textAs new products are developed for the telemetry market, network interfaces are being used for set-up and control. This paper describes the programmability of various telemetry components that are now available and discusses the internal status functions that can be returned to the user or telemetry system via the same interface that are good indicators of system health. Possible control interfaces are discussed that could be used to interface many different components. Also discussed is the need for the Range Commanders Council to address the total programmability protocol issues related to connecting multiple components into a common setup and control bus.
Oberdan, Thomas. "Protocols, truth and convention." Amsterdam ; Atlanta, GA : Rodopi, 1993. http://catalogue.bnf.fr/ark:/12148/cb35609110v.
Full textNuggehalli, Pavan S. "Energy conscious communication protocols /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2003. http://wwwlib.umi.com/cr/ucsd/fullcit?p3091328.
Full textWilliams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.
Full textIyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.
Full textLi, Kang. "Modeling the bandwidth sharing behavior of congestion controlled flows /." Full text open access at:, 2002. http://content.ohsu.edu/u?/etd,632.
Full textBarros, Gavilanes Juan Gabriel. "Réseaux de capteurs pour applications de suivi médical." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/10664/1/barros.pdf.
Full textLu, Jing. "Semi-automatic protocol implementation using an Estelle-C compiler, LAPB and RTS protocols as examples." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29419.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Maciel, Luciana França Smith. "Expressão dos receptores endometriais de estrógeno e progesterona em éguas acíclicas após administração de progesterona." Botucatu, 2017. http://hdl.handle.net/11449/151275.
Full textResumo: Progesterone (P4) is frequently used after the administration of estradiol, to prepare seasonal non-cyclic mares as embryo recipients, however previous studies have reported gestation of seasonal non-cyclic mares treated only with P4. The objective of the present study was to evaluate the gene and protein expression of estrogen receptor alpha (ERα), estrogen beta (ERβ) and progesterone (PR) in the endometrium of seasonal non-cyclic mares treated with long acting progesterone (LAP4). Eight mares were used during the seasonal anoestrus phase, uterine biopsies were performed immediately before and five days after administration of 1,5 g of LA P4. Blood samples were taken daily for the determination of plasma P4 concentration. The protein expression of the receptors was evaluated by the immunohistochemistry and the immunostaining area percentage was determined by the ImageJ software. Transcripts abundance for ERα (ESR1), ERβ (ESR2) and PR (PGR) were determined by RT-qPCR. ERα showed higher protein expression (p <0.05) after administration of P4LA, but there was no change in mRNA abundance encoding this gene (p> 0,05). Tendency to lower protein expression was observed (p=0,07) and gene expression inhibition (p <0,05) for ERβ, PR did not changes (p>0,05). The plasma concentration of P4 presented a higher concentration 24 hours after the application of LA P4 (D1), with subsequent decline in these values (p<0,05). The 1.5 g dose of LA P4 reached the minimum concentrations of P4 requi... (Resumo completo, clicar acesso eletrônico abaixo)
Mestre
Rudolph, Carsten. "A model for secure protocols and its application to systematic design of cryptographic protocols." Thesis, Queensland University of Technology, 2001.
Find full textKoegler, Xavier. "Population protocols, games and large populations." Paris 7, 2012. http://www.theses.fr/2012PA077132.
Full textPopulation protocols were introduced to capture the specifies of opportunistic networks of tny mobile agents with limited memory and capable of wireless communication in pairs. This thesis aims at extending the understanding and analysis of population protocols as well as their links to other models of population dynamics including ones from game theory. The first contribution of this thesis is to translate in terms of population protocols the dynamics of a population of agents playing a game repeatedly against each-other and adapting their strategy according to the PAVLOV behaviour. We show that protocols born from games are exactly as powerful as general population protocols. The second contribution consists in the study of the impact of symmetry on games and in the transitions of a population protocol to show that, if symmetric population protocols are equivalent to general protocols, symmetric games are significantly less powerful. The third contribution is to show how the dynamic of a population protocol can be approximated by an ordinary differential equation when the population grows to infinity. We then define a computation by a large population to be the convergence of this differential equation to a stable equilibrium. The fourth and final contribution of this thesis is the characterisation of the numbers computable in the above sense as exactly the algebraic real numbers in [0,1]
alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.
Full textCurty, Alonso Marcos. "Cryptographic protocols in optical communication." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=979048621.
Full textGheorghiu, Steluta. "Network coding for transport protocols." Doctoral thesis, Universitat Politècnica de Catalunya, 2011. http://hdl.handle.net/10803/32195.
Full textJaafar, Talal Mohamed. "Simulation-Based Routing Protocols Analyses." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16197.
Full textMohammed, Alalelddin Fuad Yousif. "Studying Media Access andControl Protocols." Thesis, KTH, Kommunikationssystem, CoS, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91193.
Full textDetta examensarbete har som mål att göra det möjligt för studenter att få inblick i tillgång till medierna och protokoll som grundar sig på att utföra laboratorieexperiment. Det pedagogiska målet är att de-mystifierande radio och annan länk och fysiska lagret kommunikationsteknik som studenterna kan följa paket från högre skikt ner genom det fysiska lagret och upp igen. Avhandlingen fyller gapet mellan den befintliga dokumentationen för Universal Software Radio Peripheral (usrp) resurser och kunskap om studerande. Detta var nödvändigt eftersom det befintliga dokument riktar sig till avancerade publik snarare än studenter. Denna avhandling beskriver utformningen och utvecklingen av en arbetsbänk för studenter att experimentera med olika tillgång till medierna och protokoll kontroll, mycket som Wireshark ger studenterna möjlighet att titta på nätet och högre skikt protokoll. Ett annat motiv för denna tes är att ett ökande antal kommunikationsnät använda komplicerade tillgång till medierna och protokoll kontroll och befintliga verktyg inte tillåter eleverna att se detaljer om vad som sker i dessa protokoll, utom via simulering. Idag en programvarustyrd radio och dator är överkomliga laboratorieutrustning för en grundutbildningskurs. Därför är tiden mogen för utvecklingen av grundutbildningen laborationer material med hjälp av dessa verktyg. Avhandlingen riktar sig till (1) instruktörer för studenter som kan använda detta arbete för att utveckla sin egen lektionsplanering och kursmaterial och (2) studenter på fysisk och länka protokoll skikt som vill ha ett praktiskt verktyg för att utföra experiment i dessa lager. Förhoppningsvis genom de-mystifierande de undre lagren och genom att göra usrp mer tillgänglig genom att studenter ska vi uppmuntra många elever att visa trådlös nätverksteknik vara lika lättillgänglig som ett ethernet. På grund av den utbredda användningen av trådlös kommunikationsteknik, finns ett stort behov från näringslivet för fler studenter som kan förstå kommunikationssystem från det fysiska till applikationslagret - i stället för den nuvarande situationen där det finns en hård gräns mellan de två lägre skikten och de övre skikten. Samtidigt som det har varit en hel del forskning om cross lager optimering, mycket av detta är teoretisk och inte särskilt tillgänglig av studenter. Ett önskat resultat med detta examensarbete är att studenter ska kunna förstå kompromisser på alla nivåer inom den protokollstack och inte vara begränsade till de övre skikten.
Donta, Praveen Kumar. "Performance Analysis of Security Protocols." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.
Full textHaqqani, Mujeeb. "Fast prototyping of communication protocols." Thesis, University of Ottawa (Canada), 1990. http://hdl.handle.net/10393/5718.
Full textBergström, Patrik. "Automated Setup of Display Protocols." Thesis, Linköpings universitet, Databas och informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-117745.
Full textRöntgenläkares arbetsbörda har under flera årtionden ökat. Den digitala sjukvårdsteknologin utvecklas ständigt vilket bidrar till ett förbättrat arbetsflöde och kortare undersökningstider i radiologiavdelningar. Datorsystem används idag överallt inom sjukvården och används bland annat för att visa bilder åt röntgenläkare. För att underlätta visningen används display protocol som automatiskt skapar layouts och hänger bilder åt användaren. För att täcka ett stort antal olika undersökningstyper krävs att användaren skapar hundratals protokoll vilket är en tidskrävande uppgift, och systemet kan ändå misslyckas med att hänga upp bilder om de strikta kraven protokollen ställer inte uppfylls. För att ta bort detta manuella steg föreslår vi att man använder maskininlärning baserat på tidigare sparade presentationer. Klassificerarna tränas på undersökningens metadata och radiologens preferenser på hängning av serier. Den valda metoden går ut på att skapa klassificerare för olika layout-regler och att sedan använda deras output i en algoritm som placerar ut series-typer till individuella bildplatser enligt kategorier baserade på metadata. Denna metod liknar den process de nuvarande display protokollen utför. De presentationer som skapats visar att systemet kan läras upp, men kräver högre precision om det ska användas kommersiellt. Analys av de olika delarna tyder på att ökad precision tidigt i systemet skulle öka den totala precision.
Long, Nguyen Hoang. "Authentication protocols in pervasive computing." Thesis, University of Oxford, 2009. https://ora.ox.ac.uk/objects/uuid:d21c0ce6-5dd6-43ef-b6c6-01346d02031b.
Full textGonzãlez-Deleito, Collell Nicolãs. "Trust relationships in exchange protocols." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210963.
Full textInformellement, un protocole mettant en oeuvre de tels types d'échanges est dit équitable si et seulement si à la fin du protocole soit l'échange d'information a eu lieu, soit aucune information (même en partie) n'a été échangée. Afin d'assurer cette propriété d'équité de manière efficace, et d'éviter ainsi des éventuels comportements malhonnêtes de la part des participants à l'échange d'informations qui chercheraient à nuire au bon déroulement du protocole, une tierce partie de confiance est utilisée.
Un des buts de cette thèse est de discerner les tâches devant être assurées par une telle tierce partie de confiance et développer des méthodes permettant d'en minimiser le nombre et l'importance, afin de limiter la confiance que les entités effectuant l'échange doivent porter à cette tierce partie. Pour cela, nous identifions tout d'abord de manière générique quels sont ces types de tâches, puis nous analysons sous ce point de vue les principaux protocoles ayant été proposés dans la littérature.
Cette démarche nous conduit ensuite naturellement à nous pencher sur les relations de confiance entre les participants à un protocole d'échange. Ce type de relations est particulièrement significatif pour des protocoles à plus de deux participants.
Enfin, dans ce travail, nous observons à la lumière des aspects de confiance, les différentes propriétés propres aux protocoles d'échange, et nous proposons plusieurs nouveaux protocoles ayant des besoins en confiance limités.
Doctorat en sciences, Spécialisation Informatique
info:eu-repo/semantics/nonPublished
Koh, Sunny. "Stratified protocols for mobile gaming." University of Southern Queensland, Faculty of Sciences, 2006. http://eprints.usq.edu.au/archive/00003851/.
Full textEhikioya, Sylvanus Agbonifoh. "Specification of transaction systems protocols." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/nq23597.pdf.
Full text