-
121Published 2004Table of Contents: “… in the Spi Calculus -- A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps -- Deciding…”
Full Text via HEAL-Link
Electronic eBook -
122Published 2019Table of Contents: “… Clustering Techniques -- Impact of Security Aspects at the IOTA protocol -- Cryptographic Protocol Security…”
Full Text via HEAL-Link
Electronic eBook -
123Published 2019Table of Contents: “… in Application Software -- Card-based Cryptographic Protocols with the Minimum Number of Rounds Using Private…”
Full Text via HEAL-Link
Electronic eBook -
124Published 2013Table of Contents: “… Attack with Clustering and Information Theoretic Measurements -- Key Management and Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
125Published 2006Table of Contents: “… Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.…”
Full Text via HEAL-Link
Electronic eBook -
126Published 2008Table of Contents: “… of Security -- Cryptographic Protocols -- An (Almost) Constant-Effort Solution-Verification Proof-of-Work…”
Full Text via HEAL-Link
Electronic eBook -
127Published 2009Table of Contents: “…-Authenticated Group Key Agreement with Adaptive Security and Contributiveness -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
128Published 2009Table of Contents: “… in Cryptographic Protocols -- Concurrency -- A Theory of Non-monotone Memory (Or: Contexts for free) -- Abstraction…”
Full Text via HEAL-Link
Electronic eBook -
129Published 2005Table of Contents: “… Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid…”
Full Text via HEAL-Link
Electronic eBook -
130Published 2007Table of Contents: “… Device Driver Verification -- Integrating Verification, Testing, and Learning for Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
131Published 2010Table of Contents: “… Virtual Computing Environment Based on Remote I/O Binding Mechanism -- Cryptographic Protocols -- Dynamic…”
Full Text via HEAL-Link
Electronic eBook -
132Published 2003Table of Contents: “…-Order Logic and Application to Cryptographic Protocols -- An E-unification Algorithm for Analyzing…”
Full Text via HEAL-Link
Electronic eBook -
133Published 2003Table of Contents: “… Charts and Projections -- Security -- Composition of Cryptographic Protocols in a Probabilistic…”
Full Text via HEAL-Link
Electronic eBook -
134Published 2001Table of Contents: “… Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication…”
Full Text via HEAL-Link
Electronic eBook -
135Published 2004Table of Contents: “… for Cryptographic Protocols -- Hypergraphs and Degrees of Parallelism: A Completeness Result -- Behavioral…”
Full Text via HEAL-Link
Electronic eBook -
136Published 2006Table of Contents: “… -- Smartcard Firewalls Revisited -- Multi-stage Packet Filtering in Network Smart Cards -- Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
137Published 2008Table of Contents: “… Management Systems -- Complexity of Checking Freshness of Cryptographic Protocols -- Secure Internet Voting…”
Full Text via HEAL-Link
Electronic eBook -
138Published 2010Table of Contents: “… -- Cryptographic Protocol -- Linear, Constant-Rounds Bit-Decomposition -- Attacking and Repairing the Improved…”
Full Text via HEAL-Link
Electronic eBook -
139Published 2000Table of Contents: “…: Obeying the Laws -- Secrecy and Group Creation -- On the Reachability Problem in Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
140Published 2005Table of Contents: “…: Complexity of Verifying Cryptographic Protocols with Single Blind Copying -- Applications of General Exact…”
Full Text via HEAL-Link
Electronic eBook