![Consensus / Alice and Bob / Constructible universe / IP / Cryptography / Cryptographic protocols / Public-key cryptography Consensus / Alice and Bob / Constructible universe / IP / Cryptography / Cryptographic protocols / Public-key cryptography](https://www.pdfsearch.io/img/c97ac9b063a042250c0d6032fc32ce9c.jpg)
| Document Date: 2007-09-28 06:20:39 Open Document File Size: 231,11 KBShare Result on Facebook
/ IndustryTerm malicious devices / time-slotted single-hop wireless radio channel / ubiquitous computing / leader election protocol / wireless network / communication protocol / sub-protocol / awake tiny devices / ad hoc network / wireless networks / honest devices / wireless coordination / energy / cryptographic solutions / broadcast protocol / wireless ad hoc network / network layer protocols / wireless ad hoc networks / n-player protocol / arbitrary n-player protocol / wireless radio channels / malicious device / wireless devices / / NaturalFeature Multiple Access Channel / / Organization MIT / / Person Lower Bound / Bob / Alice / A. Alice / Collin / / Position player / simulated player / fellow honest player / Leader leader / Safety leader / malicious player / / RadioStation Katz / / Technology leader election protocol / arbitrary n-player protocol / wireless devices / else return 1 Algorithm / 3-player communication protocol / Bit Broadcast Sub-Protocol / network layer protocols / Public key / simulation / TDMA / n-player protocol / round-based protocols / /
SocialTag |