Showing 121 - 140 results of 241 for search '"cryptographic protocol"', query time: 0.13s Refine Results
  1. 121
    Published 2004
    Table of Contents: “… in the Spi Calculus -- A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps -- Deciding…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 122
    Published 2019
    Table of Contents: “… Clustering Techniques -- Impact of Security Aspects at the IOTA protocol -- Cryptographic Protocol Security…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 123
    Published 2019
    Table of Contents: “… in Application Software -- Card-based Cryptographic Protocols with the Minimum Number of Rounds Using Private…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 124
    Published 2013
    Table of Contents: “… Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 125
    Published 2006
    Table of Contents: “… Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 126
    Published 2008
    Table of Contents: “… of Security -- Cryptographic Protocols -- An (Almost) Constant-Effort Solution-Verification Proof-of-Work…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 127
    Published 2009
    Table of Contents: “…-Authenticated Group Key Agreement with Adaptive Security and Contributiveness -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 128
    Published 2009
    Table of Contents: “… in Cryptographic Protocols -- Concurrency -- A Theory of Non-monotone Memory (Or: Contexts for free) -- Abstraction…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 129
    Published 2005
    Table of Contents: “… Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 130
    Published 2007
    Table of Contents: “… Device Driver Verification -- Integrating Verification, Testing, and Learning for Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 131
    Published 2010
    Table of Contents: “… Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 132
    Published 2003
    Table of Contents: “…-Order Logic and Application to Cryptographic Protocols -- An E-unification Algorithm for Analyzing…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 133
    Published 2003
    Table of Contents: “… Charts and Projections -- Security -- Composition of Cryptographic Protocols in a Probabilistic…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 134
    Published 2001
    Table of Contents: “… Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 135
    Published 2004
    Table of Contents: “… for Cryptographic Protocols -- Hypergraphs and Degrees of Parallelism: A Completeness Result -- Behavioral…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 136
    Published 2006
    Table of Contents: “… -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 137
    Published 2008
    Table of Contents: “… Management Systems -- Complexity of Checking Freshness of Cryptographic Protocols -- Secure Internet Voting…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 138
    Published 2010
    Table of Contents: “… -- Cryptographic Protocol -- Linear, Constant-Rounds Bit-Decomposition -- Attacking and Repairing the Improved…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 139
    Published 2000
    Table of Contents: “…: Obeying the Laws -- Secrecy and Group Creation -- On the Reachability Problem in Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 140
    Published 2005
    Table of Contents: “…: Complexity of Verifying Cryptographic Protocols with Single Blind Copying -- Applications of General Exact…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search