Showing 181 - 200 results of 241 for search '"cryptographic protocol"', query time: 0.13s Refine Results
  1. 181
    Published 2018
    Table of Contents: “… Applications to SVM -- (k,l)-clustering for Transactional Data Streams Anonymization -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 182
    Published 1999
    Table of Contents: “… -- Proof Techniques for Cryptographic Protocols -- Type Structure for Low-Level Programming Languages…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 183
    Published 2014
    Table of Contents: “… simulation of cryptographic protocols using algebraic processor -- Disturbance Injection in Dependability…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 184
    Published 2018
    Table of Contents: “… of calculations in cryptographic protocols using a combination of different bases of finite fields -- 17.Dynamic…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 185
    Published 2000
    Table of Contents: “… -- Non Interference for the Analysis of Cryptographic Protocols -- Average Bit-Complexity of Euclidean…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 186
    Published 2008
    Table of Contents: “… of DCA and Simulated Annealing Algorithm -- Non-standard Attacks against Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 187
    Published 2013
    Table of Contents: “… Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 188
    Published 2001
    Table of Contents: “… of Cryptographic Protocols -- Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols -- Fair…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 189
    Published 2009
    Table of Contents: “…-Level Reasoning and Low-Level Control -- A General Approach to the Verification of Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 190
    Published 2000
    Table of Contents: “…: Theory and Applications FMPPTA 2000 -- A Method for Automatic Cryptographic Protocol Verification…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 191
  12. 192
  13. 193
    “… seamlessly the underlying cryptographic protocols, which not only gives an added value in the design from…”
    Get full text
    Thesis
  14. 194
  15. 195
  16. 196
  17. 197
  18. 198
  19. 199
  20. 200
Search Tools: RSS Feed Email Search