Showing 81 - 100 results of 241 for search '"cryptographic protocol"', query time: 0.28s Refine Results
  1. 81
    Published 1998
    Table of Contents: “… for cryptographic protocols -- A polyvariant binding-time analysis for off-line partial deduction -- Verifiable…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 82
    Published 2010
    Table of Contents: “… Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 83
    Published 2006
    Table of Contents: “… for Distributed Sensor Networks -- Cryptographic Protocol to Establish Trusted History of Interactions -- Ad Hoc…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 84
    Published 2005
    Table of Contents: “… Bytecode -- Cryptographic Protocol Analysis on Real C Code -- Bounded Model Checking -- Simple Is Better…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 85
    Published 2005
    Table of Contents: “…Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 86
    Published 2000
    Table of Contents: “… Environment -- TAPS: A First-Order Verifier for Cryptographic Protocols -- VINAS-P: A Tool for Trace Theoretic…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 87
    Published 2010
    Table of Contents: “… Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 88
    Published 1999
    Table of Contents: “… Cryptographic Protocols with Tree Automata -- State Space Reduction Based on Live Variables Analysis -- Static…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 89
    Published 2010
    Table of Contents: “… for Shared Authorisation Data in TCG TPM -- Session 6. Protocols 2 -- Trusted Multiplexing of Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 90
    Published 2010
    Table of Contents: “… to the Analysis of Cryptographic Protocols -- On Efficient Models for Model Checking Message-Passing Distributed…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 91
    Published 2000
    Table of Contents: “… Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 92
    Published 2005
    Table of Contents: “… on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 93
    Published 2008
    Table of Contents: “… and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 94
    Published 2015
    Table of Contents: “…Cryptographic Protocols -- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 95
    Published 1997
    Table of Contents: “… time temporal logic -- Reasoning about cryptographic protocols in the spi calculus -- Modularity…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 96
    Published 2001
    Table of Contents: “…Security -- On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection -- Trust…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 97
    Published 2010
    Table of Contents: “… to Protect a Company’s Reputation -- Invited Talk -- Cryptographic Protocols from Lattices -- Encryption -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 98
    Published 2010
    Table of Contents: “… of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 99
    Published 2003
    Table of Contents: “… as Tokens -- The Coinductive Approach to Verifying Cryptographic Protocols -- Behavioural Equivalence…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 100
    Published 2002
    Table of Contents: “… Cryptographic Protocols in a Reactive Framework -- Timed Systems and Games -- An Abstract Schema for Equivalence…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search