-
81Published 1998Table of Contents: “… for cryptographic protocols -- A polyvariant binding-time analysis for off-line partial deduction -- Verifiable…”
Full Text via HEAL-Link
Electronic eBook -
82Published 2010Table of Contents: “… Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
83Published 2006Table of Contents: “… for Distributed Sensor Networks -- Cryptographic Protocol to Establish Trusted History of Interactions -- Ad Hoc…”
Full Text via HEAL-Link
Electronic eBook -
84Published 2005Table of Contents: “… Bytecode -- Cryptographic Protocol Analysis on Real C Code -- Bounded Model Checking -- Simple Is Better…”
Full Text via HEAL-Link
Electronic eBook -
85Published 2005Table of Contents: “…Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol…”
Full Text via HEAL-Link
Electronic eBook -
86Published 2000Table of Contents: “… Environment -- TAPS: A First-Order Verifier for Cryptographic Protocols -- VINAS-P: A Tool for Trace Theoretic…”
Full Text via HEAL-Link
Electronic eBook -
87Published 2010Table of Contents: “… Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring…”
Full Text via HEAL-Link
Electronic eBook -
88Published 1999Table of Contents: “… Cryptographic Protocols with Tree Automata -- State Space Reduction Based on Live Variables Analysis -- Static…”
Full Text via HEAL-Link
Electronic eBook -
89Published 2010Table of Contents: “… for Shared Authorisation Data in TCG TPM -- Session 6. Protocols 2 -- Trusted Multiplexing of Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
90Published 2010Table of Contents: “… to the Analysis of Cryptographic Protocols -- On Efficient Models for Model Checking Message-Passing Distributed…”
Full Text via HEAL-Link
Electronic eBook -
91Published 2000Table of Contents: “… Curve Cryptosystems -- Speeding Up Elliptic Scalar Multiplication with Precomputation -- Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
92Published 2005Table of Contents: “… on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional…”
Full Text via HEAL-Link
Electronic eBook -
93Published 2008Table of Contents: “… and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks…”
Full Text via HEAL-Link
Electronic eBook -
94Published 2015Table of Contents: “…Cryptographic Protocols -- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions…”
Full Text via HEAL-Link
Electronic eBook -
95Published 1997Table of Contents: “… time temporal logic -- Reasoning about cryptographic protocols in the spi calculus -- Modularity…”
Full Text via HEAL-Link
Electronic eBook -
96Published 2001Table of Contents: “…Security -- On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection -- Trust…”
Full Text via HEAL-Link
Electronic eBook -
97Published 2010Table of Contents: “… to Protect a Company’s Reputation -- Invited Talk -- Cryptographic Protocols from Lattices -- Encryption -- A…”
Full Text via HEAL-Link
Electronic eBook -
98Published 2010Table of Contents: “… of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols…”
Full Text via HEAL-Link
Electronic eBook -
99Published 2003Table of Contents: “… as Tokens -- The Coinductive Approach to Verifying Cryptographic Protocols -- Behavioural Equivalence…”
Full Text via HEAL-Link
Electronic eBook -
100Published 2002Table of Contents: “… Cryptographic Protocols in a Reactive Framework -- Timed Systems and Games -- An Abstract Schema for Equivalence…”
Full Text via HEAL-Link
Electronic eBook