Showing 141 - 160 results of 241 for search '"cryptographic protocol"', query time: 0.12s Refine Results
  1. 141
    Published 2006
    Table of Contents: “… -- Resource Fairness and Composability of Cryptographic Protocols -- One-Way Functions and Friends -- Finding…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 142
    Published 2006
    Table of Contents: “…-Verifiable Voting with Everlasting Privacy -- Cryptographic Protocols for Electronic Voting -- Asymptotically…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 143
    Published 2010
    Table of Contents: “… for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 144
    Published 2005
    Table of Contents: “… -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 145
    Published 2007
    Table of Contents: “… Producing Checkable Proofs -- Matching in Hybrid Terminologies -- Verifying Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 146
    Published 2003
    Table of Contents: “… -- Security and Cryptography -- A New Knowledge Representation Strategy for Cryptographic Protocol Analysis…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 147
    Published 2006
    Table of Contents: “… of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 148
  9. 149
    Published 2001
    Table of Contents: “… for Simultaneous Auctions -- Optimality and Risk in Purchase from Multiple Auctions -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 150
    Published 2003
    Table of Contents: “… Computation -- Cryptographic Protocols -- Distributed RSA Signature Schemes for General Access Structures…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 151
    Published 1999
    Table of Contents: “… -- An Automated Analysis of Ping-Pong Interactions in E-Mail Services -- Automatic Verification of Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 152
    Published 1997
    Table of Contents: “… in Isabelle/HOL -- A proof obligation generator for VDM-SL -- Verification of cryptographic protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 153
    Published 2010
    Table of Contents: “… -- Cryptographic Protocols Analysis in Event B -- A Query Language for Logic Architectures -- Planet Map Generation…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 154
    Published 2007
    Table of Contents: “… -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 155
    Published 2007
    Table of Contents: “… Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 156
    Published 2008
    Table of Contents: “… Camellia and MISTY1 -- Small Secret Key Attack on a Variant of RSA (Due to Takagi) -- Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 157
    Published 2019
    Table of Contents: “… Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 158
    Published 2009
    Table of Contents: “… for Collaborative Map Handling -- Collaborative Learning -- Cooperative Model Reconstruction for Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 159
  20. 160
    Published 2005
    Table of Contents: “… -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search