-
41Published 2019Table of Contents: “…Cryptographic Protocols -- Digital Signatures -- Zero-Knowledge -- Identity-Based Encryption…”
Full Text via HEAL-Link
Electronic eBook -
42Published 2019Table of Contents: “…Cryptographic Protocols -- Digital Signatures -- Zero-Knowledge -- Identity-Based Encryption…”
Full Text via HEAL-Link
Electronic eBook -
43Published 2019Table of Contents: “…Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
44Published 2017Table of Contents: “… privacy -- Bitcoin mining -- Cryptographic protocols -- Payment use and abuse.…”
Full Text via HEAL-Link
Electronic eBook -
45Published 2009Table of Contents: “…Foundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo…”
Full Text via HEAL-Link
Electronic eBook -
46Table of Contents: “…Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols -- Probabilistic…”
Full Text via HEAL-Link
Electronic eBook -
47Published 2018Table of Contents: “…Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures…”
Full Text via HEAL-Link
Electronic eBook -
48by Vaudenay, SergeTable of Contents: “… -- Digital Signature -- ?Cryptographic Protocols -- From Cryptography to Communication Security.…”
Published 2006
Full Text via HEAL-Link
Electronic eBook -
49Table of Contents: “… -- Digital Signatures -- Cryptographic Protocols -- From Cryptography to Communication Security.…”
Full Text via HEAL-Link
Electronic eBook -
50Published 2005Table of Contents: “… Processes in Untyped Contexts -- Model–Based Testing of Cryptographic Protocols -- A General Name Binding…”
Full Text via HEAL-Link
Electronic eBook -
51Published 2017Table of Contents: “… Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms.…”
Full Text via HEAL-Link
Electronic eBook -
52Published 2016Table of Contents: “… from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning…”
Full Text via HEAL-Link
Electronic eBook -
53Published 2003Table of Contents: “… for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State…”
Full Text via HEAL-Link
Electronic eBook -
54Table of Contents: “…Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
55Table of Contents: “… Key Infrastructure -- Chap. 8 Cryptographic Protocols -- Chap. 9 Cryptography Application for Data…”
Full Text via HEAL-Link
Electronic eBook -
56by Biskup, JoachimTable of Contents: “… -- Encryption -- Authentication -- Anonymization -- Some Further Cryptographic Protocols -- Implementations…”
Published 2009
Full Text via HEAL-Link
Electronic eBook -
57Published 2018Table of Contents: “… -- Cryptographic Hardware Cryptographic Software -- Cryptographic Protocols -- Formal Methods in Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
58Published 2009Table of Contents: “… Control -- Biometrics and Computer Forensics -- Cryptographic Protocols -- Data Integrity and Privacy…”
Full Text via HEAL-Link
Electronic eBook -
59Published 2010Table of Contents: “… and Untraceable DDoS Attacks -- Mechanical Verification of Cryptographic Protocols -- Routing Security in Ad Hoc…”
Full Text via HEAL-Link
Electronic eBook -
60