Font Size: a A A
Keyword [security protocols]
Result: 161 - 180 | Page: 9 of 10
161. Formal analysis of security protocols: Protocol composition logic
162. Verification techniques for mobile processes and security protocols
163. Analysis of security protocols for wireless networks
164. Lightweight Silicon-based Security Concept, Implementations, and Protocols
165. LiSP: Lightweight security protocols for wireless sensor networks
166. On the computational soundness of formal analysis of cryptographic protocols
167. Security models in rewriting logic for cryptographic protocols and browsers
168. Energy -efficient secure embedded system
169. Mobile agent security through multi-agent cryptographic protocols
170. Logical analysis and complexity of security protocols
171. Automatic design of network security protocols
172. Formal specification and analysis of security protocols
173. From type theory to the verification of security protocols
174. Efficient wireless security protocols based on elliptic curve cryptography
175. BRUTUS: A model checker for security protocols
176. Theory generation for security protocols
177. An adversary-centric logic of security and authenticity
178. Survey of Internet security protocols
179. Verifiable Data and Computation Outsourcing to the Cloud
180. Anonymous Roaming In Heterogeneous Wireless Networks
  <<First  <Prev  Next>  Last>>  Jump to