|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 7 keywords
|
|
|
Results
Found 6 publication records. Showing 6 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | Kim-Kwang Raymond Choo |
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph |
Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata. |
DEXA Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Rong Du, Ernest Foo, Colin Boyd |
Designing a secure e-tender submission protocol. |
Electron. Commer. Res. |
2008 |
DBLP DOI BibTeX RDF |
E-tendering, SHVT, Security, Cryptography, Security analysis, Procurement |
25 | Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga |
Security Evaluation of Scenarios Based on the TCG's TPM Specification. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Sigrid Gürgens, Carsten Rudolph |
Security analysis of efficient (Un-)fair non-repudiation protocols. |
Formal Aspects Comput. |
2005 |
DBLP DOI BibTeX RDF |
Asynchronous product automata, Fairness, Non-repudiation, Protocol analysis |
25 | Sigrid Gürgens, Carsten Rudolph |
Security Analysis of (Un-) Fair Non-repudiation Protocols. |
FASec |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #6 of 6 (100 per page; Change: )
|
|