|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
30 | Brian Monahan |
From Security Protocols to Systems Security (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
30 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Bruce Christianson |
Where Have All the Protocols Gone? |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Mike Burmester, Alec Yasinsac |
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
30 | James P. G. Sterbenz |
Protocols for High-Speed Networks: A Brief Retrospective Survey of High-Speed Networking Research. |
Protocols for High-Speed Networks |
2002 |
DBLP DOI BibTeX RDF |
|
30 | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Tatsuo Nakajima |
Practical Explicit Binding Interface for Supporting Multiple Transport Protocols in a CORBA System. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
practical explicit binding interface, multiple transport protocols, CORBA system, standard CORBA interfaces, application portability, extended interface, omniORB2, CORBA 2.0 compliant system, AT? Laboratories, Cambridge, QoS, transport protocols, transport protocol, object model, software portability, network interfaces, distributed object management, connection management |
29 | Ran Canetti, Hugo Krawczyk |
Universally Composable Notions of Key Exchange and Secure Channels. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security |
29 | Reiner Dojen, Tom Coffey |
The concept of layered proving trees and its application to the automation of security protocol verification. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
automated protocol verification, logic-based verification of security protocols, cryptography, Security protocols, cryptographic protocols |
29 | Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Shahzad Ali Malik |
An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
end-to-end solutions, service disruption time, performance analysis, TCP, mobility management |
29 | Tri Pham, Eun Jik Kim, W. Melody Moh |
On Data Aggregation Quality and Energy Efficiency of Wireless Sensor Network Protocols - Extended Summary. |
BROADNETS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ryan G. Lane, Scott Daniels, Xin Yuan |
An Empirical Study of Reliable Multicast Protocols over Ethernet - Connected Networks. |
ICPP |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Ralf Küsters, Max Tuengerthal |
Computational soundness for key exchange protocols with symmetric encryption. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
simulation-based security, cryptographic protocols, computational soundness |
28 | Jie Feng, Derek L. Eager, Dwight J. Makaroff |
Aggregation Protocols for High Rate, Low Delay Data Collection in Sensor Networks. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
aggregation protocols, performance evaluation, sensor networks |
28 | Ton van Deursen, Sasa Radomirovic |
Algebraic Attacks on RFID Protocols. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
RFID, Formal verification, security protocols, attacks, algebraic methods |
28 | Dengguo Feng, Weidong Chen |
Modular approach to the design and analysis of password-based security protocols. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
weak computational indistinguishability, random oracle model (ROM), provable security, security protocols, standard model |
28 | Janica Edmonds, Mauricio Papa, Sujeet Shenoi |
Security Analysis of Multilayer SCADA Protocols. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Multilayer protocols, Modbus TCP, formal methods, security analysis |
28 | Dereje H. Woldegebreal, Stefan Valentin, Holger Karl |
Outage probability analysis of cooperative transmission protocols without and with network coding: inter-user channels based comparison. |
MSWiM |
2007 |
DBLP DOI BibTeX RDF |
static and adaptive protocols, network coding, performance comparison, outage probability, cooperative transmission |
28 | François Ingelrest, David Simplot-Ryl, Ivan Stojmenovic |
Optimal Transmission Radius for Energy Efficient Broadcasting Protocols in Ad Hoc and Sensor Networks. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
energy efficient broadcasting, optimal transmission radius, localized communication protocols, sensor networks, Ad hoc networks |
28 | Graham Steel, Alan Bundy |
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures. |
J. Autom. Reason. |
2006 |
DBLP DOI BibTeX RDF |
cryptographic security protocols, counterexamples, superposition |
28 | Xiao-Hui Lin 0001, Yu-Kwong Kwok, Vincent K. N. Lau |
A Quantitative Comparison of Ad Hoc Routing Protocols with and without Channel Adaptation. |
IEEE Trans. Mob. Comput. |
2005 |
DBLP DOI BibTeX RDF |
channel adaptation, ad hoc networks, Mobile computing, routing protocols, on-demand routing |
28 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying electronic voting protocols in typed MSR. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting |
28 | Jorge Real, Alfons Crespo |
Mode Change Protocols for Real-Time Systems: A Survey and a New Proposal. |
Real Time Syst. |
2004 |
DBLP DOI BibTeX RDF |
mode change protocols, real-time scheduling, resource sharing, multimoded systems, offsets |
28 | Sukumar Ghosh, Kevin M. Lillis, Saurav Pandit, Sriram V. Pemmaraju |
Robust Topology Control Protocols. |
OPODIS |
2004 |
DBLP DOI BibTeX RDF |
topology control protocols, fault-tolerance, robustness, Ad-hoc wireless networks, k-connectivity |
28 | Shaobin Wang, Fan Hong, Xian Zhu |
Optimistic Fair-exchange Protocols Based on DSA Signatures. |
IEEE SCC |
2004 |
DBLP DOI BibTeX RDF |
DSA signatures, E-commerce, multi-signatures, Fair-exchange protocols |
28 | Jonathan Billington, Guy Edward Gallasch |
How Stop and Wait Protocols Can Fail over the Internet. |
FORTE |
2003 |
DBLP DOI BibTeX RDF |
Stop and Wait Protocols, Protocol Analysis and Verification, TCP, Coloured Petri Nets, State space methods |
28 | Vikas Jha, Rajive L. Bagrodia |
Simultaneous events and lookahead in simulation protocols. |
ACM Trans. Model. Comput. Simul. |
2000 |
DBLP DOI BibTeX RDF |
conditional event, null message, optimistic, simulation protocols, simultaneous events, time ties, time warp, lookahead, conservative |
28 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
28 | Gert Florijn |
Object Protocols as Functional Parsers. |
ECOOP |
1995 |
DBLP DOI BibTeX RDF |
interface definitions, protocols, functional programming, service definitions |
28 | Michael Roe |
Panel Session: Is Protocol Modelling Finished? |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Michael Roe |
Authentication and Naming (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Pekka Nikander, Kristiina Karvonen |
Users and Trust in Cyberspace. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Yi Deng 0002, Dongdai Lin |
Novel Omega-protocols for NP. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
?-protocols, ?-protocols, Hamiltonian cycle, concurrent zero knowledge |
28 | Juan Manuel Serrano, Sascha Ossowski |
A semantic framework for the recursive specification of interaction protocols. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
recursive definitions, standards for agents and MAS, interaction protocols, agent-based software engineering, agent communication languages and protocols, organisational models |
28 | Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson |
A calculus for control flow analysis of security protocols. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Flow logic, Static analysis, Security protocols, Cryptographic protocols, Process calculi |
28 | David Polock, Dieter Zöbel |
Conformance testing of priority inheritance protocols. |
RTCSA |
2000 |
DBLP DOI BibTeX RDF |
priority inheritance protocols, priority inversion problem, protocol interfaces, predictability criteria, scheduling, real-time systems, real time systems, protocols, operating systems, conformance testing, conformance testing, run-time systems, test suites, application programmer |
28 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire |
Hop Integrity in Computer Networks. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
hop integrity, secret exchange protocol, weak integrity protocol, strong integrity protocol, stateless protocol, protocols, network security, Transmission Control Protocol, computer networks, computer networks, TCP/IP, transport protocols, Internet Protocol, network protocol, security of data, router, telecommunication network routing, telecommunication security, message transmission |
28 | Gavin Lowe |
Some new attacks upon security protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
authentication, security protocols, public key cryptography, access protocols, cryptographic key |
28 | W. Melody Moh, Yu-Feng Chung, Teng-Sheng Moh, Joanna Wang |
Evaluation of high speed LAN protocols as multimedia carriers . |
ICCD |
1996 |
DBLP DOI BibTeX RDF |
high speed LAN protocols, multimedia carriers, full-motion video, 100 Base-T Fast Ethernet, Ethernet++, 100 VG-AnyLAN, protocols, animation, images, audio, graphics, voice |
28 | W. Melody Moh, Yu-Jen Chien, Irene Zhang, Teng-Sheng Moh |
Delay performance evaluation of high speed protocols for multimedia communications. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
delay performance evaluation, high speed protocols, delay fairness, worst-case delay performance, distributed queue dual bus, CRMA, cyclic reservation multiple access, DQMA, distributed queue multiple access, FDQ, fair distributed queue, heavy network load, reservation-based protocols, throughput, multimedia communication, multimedia communication, multimedia traffic, quality of service requirements, DQDB, access delay, message delay, heterogeneous traffic |
28 | Linda A. Ness |
L.0: A Truly Concurrent Executable Temporal Logic Language for Protocols. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
L.0, truly concurrent executable temporal logic language, true concurrency model, execution algorithm, standard imperative programming, state predicates, equality predicates, hierarchical message structure, Futurebus+, simulation, protocols, protocols, specification, temporal logic, specification languages, simulation languages |
28 | A. Udaya Shankar, Simon S. Lam |
Construction of Network Protocols by Stepwise Refinement. |
REX Workshop |
1989 |
DBLP DOI BibTeX RDF |
distributed systems, Specification, refinement, transport protocols, sliding window protocols |
28 | Alessandro Brawerman, Douglas M. Blough, Benny Bing |
Securing the download of radio configuration files for software defined radio devices. |
Mobility Management & Wireless Access Protocols |
2004 |
DBLP DOI BibTeX RDF |
analysis of protocols, radio configuration, security and privacy issues and software |
28 | A. W. Roscoe 0001 |
Intensional specifications of security protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols |
28 | H. Paul Lin, Harry E. Stovall III |
Self-Synchronizing Communication Protocols. |
IEEE Trans. Computers |
1989 |
DBLP DOI BibTeX RDF |
self-synchronizing communication protocols, synchronization problems, synchronization errors, process collision, conflicting messages, operating protocols, CCITT X.21, session control protocol, IBM System Network Architecture, protocols, standardization, collisions detection, synchronisation, protocol design, collisions resolution, SNA, message transmission, synchronization mechanism, SSPs |
28 | Lorenzo De Carli, Yi Pan, Amit Kumar 0007, Cristian Estan, Karthikeyan Sankaralingam |
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers. |
SIGCOMM |
2009 |
DBLP DOI BibTeX RDF |
high-speed routers, flexibility, dataflow, forwarding, lookup, tiled architectures |
28 | Gurdip Singh |
A Methodology for Designing Communication Protocols. |
SIGCOMM |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith 0008, Keith Wansbrough |
Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets. |
SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
specification, TCP/IP, network protocols, operational semantics, API, conformance testing, higher-order logic, sockets, HOL |
28 | John C. S. Lui, Vishal Misra, Dan Rubenstein |
On the Robustness of Soft State Protocols. |
ICNP |
2004 |
DBLP DOI BibTeX RDF |
methodology of designing network protocols, robustness, stochastic analysis |
28 | Ernesto Exposito, Patrick Sénac, David Garduno, Michel Diaz, Manuel Urueña |
Deploying New QoS Aware Transport Services. |
IDMS/PROMS |
2002 |
DBLP DOI BibTeX RDF |
transport protocols and services, Quality of Service, multimedia applications, active networks |
28 | Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Kieron Ivy Turk |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Sreekanth Malladi, Jonathan K. Millen |
Adapting Constraint Solving to Automatically Analyze UPI Protocols. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Véronique Cortier, Itsaka Rakotonirina |
How to Explain Security Protocols to Your Children. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann 0001 |
Security Protocols as Choreographies. |
Protocols, Strands, and Logic |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel |
Privacy Protocols. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
28 | David A. Basin, Lucca Hirschi, Ralf Sasse |
Symbolic Analysis of Identity-Based Protocols. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Andrew William Roscoe, Lei Wang |
Key Agreement via Protocols. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Musab A. AlTurki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols. |
Foundations of Security, Protocols, and Equational Reasoning |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001 |
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Simon N. Foley, Vivien M. Rooney |
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Alexander Hicks, Steven J. Murdoch |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Simon N. Foley, Vivien M. Rooney |
Social Constructionism in Security Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Steven J. Murdoch |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lukas Nemec |
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Steven J. Murdoch |
Incentives in Security Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams |
Non-monotonic Security Protocols and Failures in Financial Intermediation. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda |
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Sarah Azouvi, Alexander Hicks, Steven J. Murdoch |
Incentives in Security Protocols. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fabio Massacci |
Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Virgil D. Gligor, Frank Stajano |
Assuring the Safety of Asymmetric Social Protocols. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Joan Feigenbaum, Bryan Ford |
Multiple Objectives of Lawful-Surveillance Protocols. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Joan Feigenbaum |
Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Frank Stajano |
Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
28 | A. W. Roscoe 0001 |
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Khaled Baqer, Ross J. Anderson |
SMAPs: Short Message Authentication Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn |
SMAPs: Short Message Authentication Protocols. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
28 | A. W. Roscoe 0001 |
Detecting Failed Attacks on Human-Interactive Security Protocols. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Keith Irwin |
Redesigning Secure Protocols to Compel Security Checks. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Keith Irwin |
Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Michele Peroli, Luca Viganò 0001, Matteo Zavatteri |
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Luca Viganò 0001 |
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Peter Y. A. Ryan, Bruce Christianson |
Enhancements to Prepare-and-Measure Based QKD Protocols. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Peter Y. A. Ryan |
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Matt Blaze |
The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Paul Syverson |
Paul Revere Protocols. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Sandy Clark, Matt Blaze, Jonathan M. Smith |
The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Paul Syverson |
Paul Revere Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Bruce Christianson |
Introduction: Bringing Protocols to Life (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Bruno Blanchet |
Using Horn Clauses for Analyzing Security Protocols. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Riccardo Focardi, Matteo Maffei |
Types for Security Protocols. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Gavin Lowe |
Analysing Security Protocols using CSP. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska |
10051 Executive Summary - Quantitative and Qualitative Analysis of Network Protocols. |
Quantitative and Qualitative Analysis of Network Protocols |
2010 |
DBLP BibTeX RDF |
|
28 | Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska |
10051 Abstracts Collection - Quantitative and Qualitative Analysis of Network Protocols. |
Quantitative and Qualitative Analysis of Network Protocols |
2010 |
DBLP BibTeX RDF |
|
28 | Sjouke Mauw |
Security Protocols for Secret Santa (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Sjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan |
Security Protocols for Secret Santa. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Michael Backes 0001, Matteo Maffei |
Design and Verification of Anonymous Trust Protocols. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Michael Backes 0001 |
Design and Verification of Anonymous Trust Protocols. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Arjen Hommersom, Perry Groot, Peter J. F. Lucas, Mar Marcos, Begoña Martínez-Salvador |
A Constraint-based Approach to Medical Guidelines and Protocols. |
Computer-based Medical Guidelines and Protocols |
2008 |
DBLP DOI BibTeX RDF |
|
28 | David Domínguez, Carlos Fernández-Llatas, Teresa Meneu, Juan Bautista Mocholí, Riccardo Serafin |
Medical Guidelines for the Patient: Introducing the Life Assistance Protocols. |
Computer-based Medical Guidelines and Protocols |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|