Showing 161 - 180 results of 241 for search '"cryptographic protocol"', query time: 0.13s Refine Results
  1. 161
    Published 1998
    Table of Contents: “… for (Alleged) RC4 -- Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators -- Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 162
    Published 2001
    Table of Contents: “… Divisor Class Groups -- First Implementation of Cryptographic Protocols Based on Algebraic Number Fields…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 163
    Published 2007
    Table of Contents: “… Analysis of Cryptographic Protocols -- Symbolic Bisimulation for the Applied Pi Calculus -- Non-mitotic…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 164
    Published 2012
    Table of Contents: “… and Trust computing -- Authentication and access control -- Anonymity, identity management -- Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 165
    Published 1997
    Table of Contents: “… -- Weak bisimulation for fully probabilistic processes -- Towards a mechanization of cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 166
    Published 1997
    Table of Contents: “… with simple geometry -- Automatic verification of cryptographic protocols with SETHEO -- A practical…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 167
    Published 2004
    Table of Contents: “… Complexity -- Synthesising Attacks on Cryptographic Protocols -- Büchi Complementation Made Tighter -- SAT…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 168
    Published 2004
    Table of Contents: “… for the Boundedness of UML RT Models -- Automatic Verification of Time Sensitive Cryptographic Protocols -- Case…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 169
    Published 2004
    Table of Contents: “… Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 170
    Published 2010
    Table of Contents: “… Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 171
    Published 2014
    Table of Contents: “… Relevant Framework for Designing Cryptographic Protocols -- A CAPTCHA Scheme Based on the Identification…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 172
    Published 2006
    Table of Contents: “… into Universal Designated Verifier Signatures -- Cryptographic Protocols -- Corrupting One vs. Corrupting Many…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 173
    Published 2010
    Table of Contents: “…-Independent Security -- Cryptographic Protocols -- Secure Multiparty Linear Programming Using Fixed-Point…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 174
    Published 2009
    Table of Contents: “… -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 175
    Published 1998
    Table of Contents: “…-checking techniques for the formal verification of cryptographic protocols -- Verifying systems…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 176
    Published 2005
    Table of Contents: “… Generation for Web Communities Modeling -- Recursion Versus Replication in Simple Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 177
    Published 2008
    Table of Contents: “… and B Security Models -- Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols -- Using…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 178
    Published 2003
    Table of Contents: “… Survey -- Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 179
    Published 2004
    Table of Contents: “… -- Lattices with Many Cycles Are Dense -- Automata-Based Analysis of Recursive Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 180
    Published 2007
    Table of Contents: “… Verification -- The Heterogeneous Tool Set, Hets -- Security -- Searching for Shapes in Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search