Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Free protocol

Known as: Libre protocol 
A free protocol is a protocol whose full specification is freely available and for which there are no restrictions (e.g. legal or technical) on its… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
We consider the well-studied cake cutting problem in which the goal is to identify an envy-free allocation based on a minimal… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2016
Highly Cited
2016
We consider the well-studied cake cutting problem in which the goal is to find an envy-free allocation based on queries from n… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2013
2013
We propose an efficient logical layer-based reconciliation method for continuous-variable quantum key distribution (CVQKD) to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
High altitude platforms (HAPs) and Flying Ad Hoc Networks (FANETs) are some of the most promising technologies for both military… Expand
  • table I
  • table II
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In many scenarios, quickly solving a relatively small search problem with an arbitrary start and arbitrary goal state is… Expand
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Secure protocols attempt to minimize the injuries to privacy and correctness inflicted by malicious participants who collude… Expand
  • figure 1
Is this relevant?
2003
2003
With the increasing use of web services, many new challenges concerning data security are becoming critical. Especially in mobile… Expand
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
In this paper we consider implementation of atomic wait-free objects in the context of a shared-memory multiprocessor. We… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?