-
141Published 2006Table of Contents: “… -- Resource Fairness and Composability of Cryptographic Protocols -- One-Way Functions and Friends -- Finding…”
Full Text via HEAL-Link
Electronic eBook -
142Published 2006Table of Contents: “…-Verifiable Voting with Everlasting Privacy -- Cryptographic Protocols for Electronic Voting -- Asymptotically…”
Full Text via HEAL-Link
Electronic eBook -
143Published 2010Table of Contents: “… for Cryptographic Protocols -- Credential Chain Discovery in RTT Trust Management Language -- Genetic Optimization…”
Full Text via HEAL-Link
Electronic eBook -
144Published 2005Table of Contents: “… -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure…”
Full Text via HEAL-Link
Electronic eBook -
145Published 2007Table of Contents: “… Producing Checkable Proofs -- Matching in Hybrid Terminologies -- Verifying Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
146Published 2003Table of Contents: “… -- Security and Cryptography -- A New Knowledge Representation Strategy for Cryptographic Protocol Analysis…”
Full Text via HEAL-Link
Electronic eBook -
147Published 2006Table of Contents: “… of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting…”
Full Text via HEAL-Link
Electronic eBook -
148
-
149Published 2001Table of Contents: “… for Simultaneous Auctions -- Optimality and Risk in Purchase from Multiple Auctions -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
150Published 2003Table of Contents: “… Computation -- Cryptographic Protocols -- Distributed RSA Signature Schemes for General Access Structures…”
Full Text via HEAL-Link
Electronic eBook -
151Published 1999Table of Contents: “… -- An Automated Analysis of Ping-Pong Interactions in E-Mail Services -- Automatic Verification of Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
152Published 1997Table of Contents: “… in Isabelle/HOL -- A proof obligation generator for VDM-SL -- Verification of cryptographic protocols…”
Full Text via HEAL-Link
Electronic eBook -
153Published 2010Table of Contents: “… -- Cryptographic Protocols Analysis in Event B -- A Query Language for Logic Architectures -- Planet Map Generation…”
Full Text via HEAL-Link
Electronic eBook -
154Published 2007Table of Contents: “… -- Cryptographic Protocols -- A New Protocol for Conditional Disclosure of Secrets and Its Applications…”
Full Text via HEAL-Link
Electronic eBook -
155Published 2007Table of Contents: “… Rijndael -- High-Speed Pipelined Hardware Architecture for Galois Counter Mode -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
156Published 2008Table of Contents: “… Camellia and MISTY1 -- Small Secret Key Attack on a Variant of RSA (Due to Takagi) -- Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
157Published 2019Table of Contents: “… Automated Application-Specific Software Stacks -- Cryptographic Protocols -- Identity-Based Encryption…”
Full Text via HEAL-Link
Electronic eBook -
158Published 2009Table of Contents: “… for Collaborative Map Handling -- Collaborative Learning -- Cooperative Model Reconstruction for Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
159
-
160Published 2005Table of Contents: “… -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key…”
Full Text via HEAL-Link
Electronic eBook