-
161Published 1998Table of Contents: “… for (Alleged) RC4 -- Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators -- Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
162Published 2001Table of Contents: “… Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields…”
Full Text via HEAL-Link
Electronic eBook -
163Published 2007Table of Contents: “… Analysis of Cryptographic Protocols -- Symbolic Bisimulation for the Applied Pi Calculus -- Non-mitotic…”
Full Text via HEAL-Link
Electronic eBook -
164Published 2012Table of Contents: “… and Trust computing -- Authentication and access control -- Anonymity, identity management -- Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
165Published 1997Table of Contents: “… -- Weak bisimulation for fully probabilistic processes -- Towards a mechanization of cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
166Published 1997Table of Contents: “… with simple geometry -- Automatic verification of cryptographic protocols with SETHEO -- A practical…”
Full Text via HEAL-Link
Electronic eBook -
167Published 2004Table of Contents: “… Complexity -- Synthesising Attacks on Cryptographic Protocols -- Büchi Complementation Made Tighter -- SAT…”
Full Text via HEAL-Link
Electronic eBook -
168Published 2004Table of Contents: “… for the Boundedness of UML RT Models -- Automatic Verification of Time Sensitive Cryptographic Protocols -- Case…”
Full Text via HEAL-Link
Electronic eBook -
169Published 2004Table of Contents: “… Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully…”
Full Text via HEAL-Link
Electronic eBook -
170Published 2010Table of Contents: “… Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer…”
Full Text via HEAL-Link
Electronic eBook -
171Published 2014Table of Contents: “… Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification…”
Full Text via HEAL-Link
Electronic eBook -
172Published 2006Table of Contents: “… into Universal Designated Verifier Signatures -- Cryptographic Protocols -- Corrupting One vs. Corrupting Many…”
Full Text via HEAL-Link
Electronic eBook -
173Published 2010Table of Contents: “…-Independent Security -- Cryptographic Protocols -- Secure Multiparty Linear Programming Using Fixed-Point…”
Full Text via HEAL-Link
Electronic eBook -
174Published 2009Table of Contents: “… -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
175Published 1998Table of Contents: “…-checking techniques for the formal verification of cryptographic protocols -- Verifying systems…”
Full Text via HEAL-Link
Electronic eBook -
176Published 2005Table of Contents: “… Generation for Web Communities Modeling -- Recursion Versus Replication in Simple Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
177Published 2008Table of Contents: “… and B Security Models -- Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols -- Using…”
Full Text via HEAL-Link
Electronic eBook -
178Published 2003Table of Contents: “… Survey -- Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
179Published 2004Table of Contents: “… -- Lattices with Many Cycles Are Dense -- Automata-Based Analysis of Recursive Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
180Published 2007Table of Contents: “… Verification -- The Heterogeneous Tool Set, Hets -- Security -- Searching for Shapes in Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook