Showing 41 - 60 results of 241 for search '"cryptographic protocol"', query time: 0.12s Refine Results
  1. 41
    Published 2019
    Table of Contents: “…Cryptographic Protocols -- Digital Signatures -- Zero-Knowledge -- Identity-Based Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 42
    Published 2019
    Table of Contents: “…Cryptographic Protocols -- Digital Signatures -- Zero-Knowledge -- Identity-Based Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 43
    Published 2019
    Table of Contents: “…Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 44
    Published 2017
    Table of Contents: “… privacy -- Bitcoin mining -- Cryptographic protocols -- Payment use and abuse.…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 45
    Published 2009
    Table of Contents: “…Foundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 46
    by Delfs, Hans, Knebl, Helmut
    Published 2007
    Table of Contents: “…Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols -- Probabilistic…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 47
    Published 2018
    Table of Contents: “…Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 48
    by Vaudenay, Serge
    Published 2006
    Table of Contents: “… -- Digital Signature -- ?Cryptographic Protocols -- From Cryptography to Communication Security.…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 49
    Table of Contents: “… -- Digital Signatures -- Cryptographic Protocols -- From Cryptography to Communication Security.…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 50
    Published 2005
    Table of Contents: “… Processes in Untyped Contexts -- Model–Based Testing of Cryptographic Protocols -- A General Name Binding…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 51
    Published 2017
    Table of Contents: “… Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms.…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 52
    Published 2016
    Table of Contents: “… from Flash Crowds -- A Supporting Tool for Spiral Model of Cryptographic Protocol Design with Reasoning…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 53
    Published 2003
    Table of Contents: “… for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 54
    by Delfs, Hans, Knebl, Helmut
    Published 2015
    Table of Contents: “…Introduction -- Symmetric-Key Encryption -- Public-Key Cryptography -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 55
    Table of Contents: “… Key Infrastructure -- Chap. 8 Cryptographic Protocols -- Chap. 9 Cryptography Application for Data…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 56
    by Biskup, Joachim
    Published 2009
    Table of Contents: “… -- Encryption -- Authentication -- Anonymization -- Some Further Cryptographic Protocols -- Implementations…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 57
    Published 2018
    Table of Contents: “… -- Cryptographic Hardware Cryptographic Software -- Cryptographic Protocols -- Formal Methods in Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 58
    Published 2009
    Table of Contents: “… Control -- Biometrics and Computer Forensics -- Cryptographic Protocols -- Data Integrity and Privacy…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 59
    Published 2010
    Table of Contents: “… and Untraceable DDoS Attacks -- Mechanical Verification of Cryptographic Protocols -- Routing Security in Ad Hoc…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 60
Search Tools: RSS Feed Email Search