{"id":12352,"date":"2021-11-09T21:08:46","date_gmt":"2021-11-10T02:08:46","guid":{"rendered":"https:\/\/carleton.ca\/scs\/?page_id=12352"},"modified":"2021-12-07T20:26:37","modified_gmt":"2021-12-08T01:26:37","slug":"technical-reports-2006","status":"publish","type":"page","link":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/","title":{"rendered":"Technical Reports 2006"},"content":{"rendered":"<table style=\"width: 100%; margin: 0; padding: 0;\">\n<tbody>\n<tr style=\"background-color: #f5e1e1;\">\n<td style=\"font-weight: bold;\" colspan=\"4\">Technical Reports 2006<\/td>\n<td style=\"margin: 0; padding: 15px 0 0 0;\"><p><select id=\"TechReportYear\" style=\"font-size: 1em;\" onchange=\"var url = $(this).val(); window.location = url;\"><option selected=\"selected\" value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1982\/\">Select Year<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1982\/\">Tech Reports 1982<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1983\/\">Tech Reports 1983<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1984\/\">Tech Reports 1984<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1985\/\">Tech Reports 1985<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1986\/\">Tech Reports 1986<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1987\/\">Tech Reports 1987<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1988\/\">Tech Reports 1988<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1989\/\">Tech Reports 1989<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1990\/\">Tech Reports 1990<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1991\/\">Tech Reports 1991<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1992\/\">Tech Reports 1992<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1993\/\">Tech Reports 1993<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1994\/\">Tech Reports 1994<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1995\/\">Tech Reports 1995<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1996\/\">Tech Reports 1996<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1997\/\">Tech Reports 1997<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1998\/\">Tech Reports 1998<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1999\/\">Tech Reports 1999<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2000\/\">Tech Reports 2000<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2001\/\">Tech Reports 2001<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2002\/\">Tech Reports 2002<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2003\/\">Tech Reports 2003<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\">Tech Reports 2004<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\">Tech Reports 2005<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\">Tech Reports 2006<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2007\/\">Tech Reports 2007<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2008\/\">Tech Reports 2008<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2009\/\">Tech Reports 2009<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2010\/\">Tech Reports 2010<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2011\/\">Tech Reports 2011<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2012\/\">Tech Reports 2012<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2013\/\">Tech Reports 2013<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2014\/\">Tech Reports 2014<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2015\/\">Tech Reports 2015<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2016\/\">Tech Reports 2016<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2017\/\">Tech Reports 2017<\/option><\/select><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15%;\"><strong>Number<\/strong><\/td>\n<td style=\"width: 25%;\"><strong>Title<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Authors<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Date<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Download<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-01<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-01-a-protocol-for-secure-public-instant-messaging-extended-version\/\">A Protocol for Secure Public Instant Messaging (Extended Version)*<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">M. Mannan &amp; P.C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">January 18, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-01.pdf\">TR-06-01.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-02<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-02-a-grammar-for-describing-protocol-text\/\">A Grammar for Describing Protocol Text<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">E. Hughes<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">February 1, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-02.pdf\">TR-06-02.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-03<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-03-rotational-clamshell-casting-in-two-dimensions\/\">Rotational Clamshell Casting In Two Dimensions<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">P. Bose, P. Morin, M. Smid, S. Wuhrer<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">February 14, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-03.pdf\">TR-06-03.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-04<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-04-rotational-clamshell-casting-in-three-dimensions\/\">Rotational Clamshell Casting In Three Dimensions<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">P. Bose, P. Morin, M. Smid, S. Wuhrer<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">February 17, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-04.pdf\">TR-06-04.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-05<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-05-internet-geolocation-and-evasion\/\">Internet Geolocation and Evasion<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">J.A. Muir &amp; P.C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">April 11, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-05.pdf\">TR-06-05.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-06<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-06-exposure-maps-removing-reliance-on-attribution-during-scan-detection\/\">Exposure Maps: Removing Reliance on Attribution During Scan Detection<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">David Whyte, P.C. Van Oorschot, Evangelos Kranakis<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">April 19, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-06.pdf\">TR-06-06.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-07<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-07-removing-outliers-to-minimize-area-and-perimeter\/\">Removing Outliers to Minimize Area and Perimeter<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">R. Aanassov, P. Morin, S. Wuhrer<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">May 1, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-07.pdf\">TR-06-07.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-08<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-08-using-a-personal-device-to-strengthen-password-authentication-from-an-untrusted-computer\/\">Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Mohammad Mannan &amp; Paul C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">May 9, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-08.pdf\">TR-06-08.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-09<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-09-flips-in-planar-graphs\/\">Flips in Planar Graphs<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Prosenjit Bose &amp; Ferran Hurtado<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">June 9, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-09.pdf\">TR-06-09.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-10<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-10-an-optimal-randomized-algorithm-for-d-variate-zonoid-depth\/\">An Optimal Randomized Algorithm for d-Variate Zonoid Depth<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Pat Morin<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">September 20, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-10.pdf\">TR-06-10.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-11<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-11-incremental-construction-of-k-dominating-sets-in-wireless-sensor\/\">Incremental Construction of k-Dominating Sets in Wireless Sensor<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Mathieu Couture, Michel Barbeau, Prosenjit Bose, Evangelos Kranakis<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">December 18, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-11.pdf\">TR-06-11.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-12<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-12-output-sensitive-algorithms-for-tukey-depth-and-related-problems\/\">Output-sensitive algorithms for Tukey depth and related problems<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">D. Bremner, D. Chen, J. Iacono, S. Langerman, P. Morin<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">November 22, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-12.pdf\">TR-06-12.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-13<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-13-distribution-sensitive-point-location-in-convex-subdivisions\/\">Distribution-Sensitive Point Location in Convex Subdivisions<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Sebastien Collette, John Iacono, Stefan Langerman, Pat Morin<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">November 27, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-13.pdf\">TR-06-13.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-06-14<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/tr-06-14-croo-a-generic-architecture-and-protocol-to-detect-identity-fraud\/\">CROO: A Generic Architecture and Protocol to Detect Identity Fraud<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">D. Nali &amp; P.C. van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">December 20, 2006<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-06-14.pdf\">TR-06-14.pdf<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Technical Reports 2006 Number Title Authors Date Download TR-06-01 A Protocol for Secure Public Instant Messaging (Extended Version)* M. Mannan &amp; P.C. Van Oorschot January 18, 2006 TR-06-01.pdf TR-06-02 A Grammar for Describing Protocol Text E. Hughes February 1, 2006 TR-06-02.pdf TR-06-03 Rotational Clamshell Casting In Two Dimensions P. Bose, P. Morin, M. Smid, S. [&hellip;]<\/p>\n","protected":false},"author":49,"featured_media":0,"parent":11593,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technical Reports 2006 - School of Computer Science<\/title>\n<meta name=\"description\" content=\"Technical Reports 2006 Number Title Authors Date Download TR-06-01 A Protocol for Secure Public Instant Messaging (Extended Version)* M. Mannan &amp; P.C.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\",\"url\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\",\"name\":\"Technical Reports 2006 - School of Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/scs\/#website\"},\"datePublished\":\"2021-11-10T02:08:46+00:00\",\"dateModified\":\"2021-12-08T01:26:37+00:00\",\"description\":\"Technical Reports 2006 Number Title Authors Date Download TR-06-01 A Protocol for Secure Public Instant Messaging (Extended Version)* M. Mannan &amp; P.C.\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/scs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SCS Technical Reports\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Technical Reports 2006\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/scs\/#website\",\"url\":\"https:\/\/carleton.ca\/scs\/\",\"name\":\"School of Computer Science\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/scs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technical Reports 2006 - School of Computer Science","description":"Technical Reports 2006 Number Title Authors Date Download TR-06-01 A Protocol for Secure Public Instant Messaging (Extended Version)* M. Mannan &amp; P.C.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/","url":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/","name":"Technical Reports 2006 - School of Computer Science","isPartOf":{"@id":"https:\/\/carleton.ca\/scs\/#website"},"datePublished":"2021-11-10T02:08:46+00:00","dateModified":"2021-12-08T01:26:37+00:00","description":"Technical Reports 2006 Number Title Authors Date Download TR-06-01 A Protocol for Secure Public Instant Messaging (Extended Version)* M. Mannan &amp; P.C.","breadcrumb":{"@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/scs\/"},{"@type":"ListItem","position":2,"name":"Research","item":"https:\/\/carleton.ca\/scs\/research\/"},{"@type":"ListItem","position":3,"name":"SCS Technical Reports","item":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/"},{"@type":"ListItem","position":4,"name":"Technical Reports 2006"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/scs\/#website","url":"https:\/\/carleton.ca\/scs\/","name":"School of Computer Science","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/scs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_uploaded_image":{"ID":8983,"id":8983,"title":"Coding screen","filename":"laptop-code-1600.jpg","filesize":154356,"url":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","link":"https:\/\/carleton.ca\/scs\/tech-support\/laptop-code-1600\/","alt":"Coding screen","author":"7","description":"Coding screen","caption":"","name":"laptop-code-1600","status":"inherit","uploaded_to":6535,"date":"2021-02-10 15:47:55","modified":"2021-11-25 20:57:39","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/carleton.ca\/scs\/wp\/wp-includes\/images\/media\/default.png","width":1600,"height":700,"sizes":{"thumbnail":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-160x70.jpg","thumbnail-width":160,"thumbnail-height":70,"medium":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-240x105.jpg","medium-width":240,"medium-height":105,"medium_large":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-768x336.jpg","medium_large-width":768,"medium_large-height":336,"large":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-400x175.jpg","large-width":400,"large-height":175,"gallery-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-300x230.jpg","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-1536x672.jpg","1536x1536-width":1536,"1536x1536-height":672,"2048x2048":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","2048x2048-width":1600,"2048x2048-height":700,"banner":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","banner-width":1600,"banner-height":700,"people":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-200x200.jpg","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-300x230.jpg","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-800x600.jpg","rotator-image-width":800,"rotator-image-height":600,"video-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-360x158.jpg","video-thumb-width":360,"video-thumb-height":158}},"banner_image_type":"upload","banner_button":"no","banner_opacity":"dark"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12352"}],"collection":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/comments?post=12352"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12352\/revisions"}],"predecessor-version":[{"id":13185,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12352\/revisions\/13185"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/11593"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/media?parent=12352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}