Font Size: a A A
Keyword [Cryptographic Protocols]
Result: 41 - 60 | Page: 3 of 4
41. Philosophical Implication In Logical Methods On Analyzing The Security Of Cryptographic Protocols
42. Research On Dynamic Asymmetric Group Key Agreement Protocols
43. Universal Composability Study Of Several Cryptographic Protocols
44. On Construction Of Lattice-Based Cryptographic Protocols And Analysis
45. Partially specified protocols: Towards proofs of real-world cryptographic protocols
46. Enhancing privacy in cryptographic protocols
47. Static analyses of cryptographic protocols
48. On formal methods of checking cryptographic protocols
49. Hardware design for cryptographic protocols: An algorithmic state machine design approach
50. A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
51. On the computational soundness of formal analysis of cryptographic protocols
52. Groups, complexity, cryptology
53. Security models in rewriting logic for cryptographic protocols and browsers
54. Mobile agent security through multi-agent cryptographic protocols
55. Exploring privacy in location-based services using cryptographic protocols
56. Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols
57. Integration of cellular automata computation model into bit-stream and Feistel networks cryptographic protocols (Spanish text)
58. Formal verification of cryptographic protocols
59. Specification and analysis of Internet cryptographic protocols using a Petri net modeler
60. Automated security analysis of cryptographic protocols using coloured Petri net specifications
  <<First  <Prev  Next>  Last>>  Jump to