The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
30Brian Monahan From Security Protocols to Systems Security (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30N. Asokan, Valtteri Niemi, Kaisa Nyberg Man-in-the-Middle in Tunnelled Authentication Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Bruce Christianson Where Have All the Protocols Gone? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Mike Burmester, Alec Yasinsac Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30James P. G. Sterbenz Protocols for High-Speed Networks: A Brief Retrospective Survey of High-Speed Networking Research. Search on Bibsonomy Protocols for High-Speed Networks The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Tatsuo Nakajima Practical Explicit Binding Interface for Supporting Multiple Transport Protocols in a CORBA System. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF practical explicit binding interface, multiple transport protocols, CORBA system, standard CORBA interfaces, application portability, extended interface, omniORB2, CORBA 2.0 compliant system, AT? Laboratories, Cambridge, QoS, transport protocols, transport protocol, object model, software portability, network interfaces, distributed object management, connection management
29Ran Canetti, Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security
29Reiner Dojen, Tom Coffey The concept of layered proving trees and its application to the automation of security protocol verification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated protocol verification, logic-based verification of security protocols, cryptography, Security protocols, cryptographic protocols
29Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Shahzad Ali Malik An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF end-to-end solutions, service disruption time, performance analysis, TCP, mobility management
29Tri Pham, Eun Jik Kim, W. Melody Moh On Data Aggregation Quality and Energy Efficiency of Wireless Sensor Network Protocols - Extended Summary. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Ryan G. Lane, Scott Daniels, Xin Yuan An Empirical Study of Reliable Multicast Protocols over Ethernet - Connected Networks. Search on Bibsonomy ICPP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Ralf Küsters, Max Tuengerthal Computational soundness for key exchange protocols with symmetric encryption. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF simulation-based security, cryptographic protocols, computational soundness
28Jie Feng, Derek L. Eager, Dwight J. Makaroff Aggregation Protocols for High Rate, Low Delay Data Collection in Sensor Networks. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF aggregation protocols, performance evaluation, sensor networks
28Ton van Deursen, Sasa Radomirovic Algebraic Attacks on RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Formal verification, security protocols, attacks, algebraic methods
28Dengguo Feng, Weidong Chen Modular approach to the design and analysis of password-based security protocols. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF weak computational indistinguishability, random oracle model (ROM), provable security, security protocols, standard model
28Janica Edmonds, Mauricio Papa, Sujeet Shenoi Security Analysis of Multilayer SCADA Protocols. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multilayer protocols, Modbus TCP, formal methods, security analysis
28Dereje H. Woldegebreal, Stefan Valentin, Holger Karl Outage probability analysis of cooperative transmission protocols without and with network coding: inter-user channels based comparison. Search on Bibsonomy MSWiM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF static and adaptive protocols, network coding, performance comparison, outage probability, cooperative transmission
28François Ingelrest, David Simplot-Ryl, Ivan Stojmenovic Optimal Transmission Radius for Energy Efficient Broadcasting Protocols in Ad Hoc and Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF energy efficient broadcasting, optimal transmission radius, localized communication protocols, sensor networks, Ad hoc networks
28Graham Steel, Alan Bundy Attacking Group Protocols by Refuting Incorrect Inductive Conjectures. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic security protocols, counterexamples, superposition
28Xiao-Hui Lin 0001, Yu-Kwong Kwok, Vincent K. N. Lau A Quantitative Comparison of Ad Hoc Routing Protocols with and without Channel Adaptation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF channel adaptation, ad hoc networks, Mobile computing, routing protocols, on-demand routing
28Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas Specifying electronic voting protocols in typed MSR. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting
28Jorge Real, Alfons Crespo Mode Change Protocols for Real-Time Systems: A Survey and a New Proposal. Search on Bibsonomy Real Time Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mode change protocols, real-time scheduling, resource sharing, multimoded systems, offsets
28Sukumar Ghosh, Kevin M. Lillis, Saurav Pandit, Sriram V. Pemmaraju Robust Topology Control Protocols. Search on Bibsonomy OPODIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF topology control protocols, fault-tolerance, robustness, Ad-hoc wireless networks, k-connectivity
28Shaobin Wang, Fan Hong, Xian Zhu Optimistic Fair-exchange Protocols Based on DSA Signatures. Search on Bibsonomy IEEE SCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DSA signatures, E-commerce, multi-signatures, Fair-exchange protocols
28Jonathan Billington, Guy Edward Gallasch How Stop and Wait Protocols Can Fail over the Internet. Search on Bibsonomy FORTE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Stop and Wait Protocols, Protocol Analysis and Verification, TCP, Coloured Petri Nets, State space methods
28Vikas Jha, Rajive L. Bagrodia Simultaneous events and lookahead in simulation protocols. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF conditional event, null message, optimistic, simulation protocols, simultaneous events, time ties, time warp, lookahead, conservative
28Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
28Gert Florijn Object Protocols as Functional Parsers. Search on Bibsonomy ECOOP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF interface definitions, protocols, functional programming, service definitions
28Michael Roe Panel Session: Is Protocol Modelling Finished? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Michael Roe Authentication and Naming (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Pekka Nikander, Kristiina Karvonen Users and Trust in Cyberspace. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Yi Deng 0002, Dongdai Lin Novel Omega-protocols for NP. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ?-protocols, ?-protocols, Hamiltonian cycle, concurrent zero knowledge
28Juan Manuel Serrano, Sascha Ossowski A semantic framework for the recursive specification of interaction protocols. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF recursive definitions, standards for agents and MAS, interaction protocols, agent-based software engineering, agent communication languages and protocols, organisational models
28Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson A calculus for control flow analysis of security protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Flow logic, Static analysis, Security protocols, Cryptographic protocols, Process calculi
28David Polock, Dieter Zöbel Conformance testing of priority inheritance protocols. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF priority inheritance protocols, priority inversion problem, protocol interfaces, predictability criteria, scheduling, real-time systems, real time systems, protocols, operating systems, conformance testing, conformance testing, run-time systems, test suites, application programmer
28Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire Hop Integrity in Computer Networks. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hop integrity, secret exchange protocol, weak integrity protocol, strong integrity protocol, stateless protocol, protocols, network security, Transmission Control Protocol, computer networks, computer networks, TCP/IP, transport protocols, Internet Protocol, network protocol, security of data, router, telecommunication network routing, telecommunication security, message transmission
28Gavin Lowe Some new attacks upon security protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication, security protocols, public key cryptography, access protocols, cryptographic key
28W. Melody Moh, Yu-Feng Chung, Teng-Sheng Moh, Joanna Wang Evaluation of high speed LAN protocols as multimedia carriers . Search on Bibsonomy ICCD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF high speed LAN protocols, multimedia carriers, full-motion video, 100 Base-T Fast Ethernet, Ethernet++, 100 VG-AnyLAN, protocols, animation, images, audio, graphics, voice
28W. Melody Moh, Yu-Jen Chien, Irene Zhang, Teng-Sheng Moh Delay performance evaluation of high speed protocols for multimedia communications. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF delay performance evaluation, high speed protocols, delay fairness, worst-case delay performance, distributed queue dual bus, CRMA, cyclic reservation multiple access, DQMA, distributed queue multiple access, FDQ, fair distributed queue, heavy network load, reservation-based protocols, throughput, multimedia communication, multimedia communication, multimedia traffic, quality of service requirements, DQDB, access delay, message delay, heterogeneous traffic
28Linda A. Ness L.0: A Truly Concurrent Executable Temporal Logic Language for Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF L.0, truly concurrent executable temporal logic language, true concurrency model, execution algorithm, standard imperative programming, state predicates, equality predicates, hierarchical message structure, Futurebus+, simulation, protocols, protocols, specification, temporal logic, specification languages, simulation languages
28A. Udaya Shankar, Simon S. Lam Construction of Network Protocols by Stepwise Refinement. Search on Bibsonomy REX Workshop The full citation details ... 1989 DBLP  DOI  BibTeX  RDF distributed systems, Specification, refinement, transport protocols, sliding window protocols
28Alessandro Brawerman, Douglas M. Blough, Benny Bing Securing the download of radio configuration files for software defined radio devices. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF analysis of protocols, radio configuration, security and privacy issues and software
28A. W. Roscoe 0001 Intensional specifications of security protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols
28H. Paul Lin, Harry E. Stovall III Self-Synchronizing Communication Protocols. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1989 DBLP  DOI  BibTeX  RDF self-synchronizing communication protocols, synchronization problems, synchronization errors, process collision, conflicting messages, operating protocols, CCITT X.21, session control protocol, IBM System Network Architecture, protocols, standardization, collisions detection, synchronisation, protocol design, collisions resolution, SNA, message transmission, synchronization mechanism, SSPs
28Lorenzo De Carli, Yi Pan, Amit Kumar 0007, Cristian Estan, Karthikeyan Sankaralingam PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers. Search on Bibsonomy SIGCOMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF high-speed routers, flexibility, dataflow, forwarding, lookup, tiled architectures
28Gurdip Singh A Methodology for Designing Communication Protocols. Search on Bibsonomy SIGCOMM The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
28Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith 0008, Keith Wansbrough Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF specification, TCP/IP, network protocols, operational semantics, API, conformance testing, higher-order logic, sockets, HOL
28John C. S. Lui, Vishal Misra, Dan Rubenstein On the Robustness of Soft State Protocols. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF methodology of designing network protocols, robustness, stochastic analysis
28Ernesto Exposito, Patrick Sénac, David Garduno, Michel Diaz, Manuel Urueña Deploying New QoS Aware Transport Services. Search on Bibsonomy IDMS/PROMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF transport protocols and services, Quality of Service, multimedia applications, active networks
28Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Kieron Ivy Turk Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Sreekanth Malladi, Jonathan K. Millen Adapting Constraint Solving to Automatically Analyze UPI Protocols. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Véronique Cortier, Itsaka Rakotonirina How to Explain Security Protocols to Your Children. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann 0001 Security Protocols as Choreographies. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel Privacy Protocols. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28David A. Basin, Lucca Hirschi, Ralf Sasse Symbolic Analysis of Identity-Based Protocols. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Andrew William Roscoe, Lei Wang Key Agreement via Protocols. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Musab A. AlTurki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001 Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Simon N. Foley, Vivien M. Rooney Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Alexander Hicks, Steven J. Murdoch Transparency Enhancing Technologies to Make Security Protocols Work for Humans. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Simon N. Foley, Vivien M. Rooney Social Constructionism in Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Steven J. Murdoch Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Lukas Nemec Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Steven J. Murdoch Incentives in Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams Non-monotonic Security Protocols and Failures in Financial Intermediation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Sarah Azouvi, Alexander Hicks, Steven J. Murdoch Incentives in Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Fabio Massacci Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Virgil D. Gligor, Frank Stajano Assuring the Safety of Asymmetric Social Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Joan Feigenbaum, Bryan Ford Multiple Objectives of Lawful-Surveillance Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Joan Feigenbaum Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Frank Stajano Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28A. W. Roscoe 0001 Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Khaled Baqer, Ross J. Anderson SMAPs: Short Message Authentication Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn SMAPs: Short Message Authentication Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28A. W. Roscoe 0001 Detecting Failed Attacks on Human-Interactive Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Keith Irwin Redesigning Secure Protocols to Compel Security Checks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Keith Irwin Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Michele Peroli, Luca Viganò 0001, Matteo Zavatteri Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Luca Viganò 0001 Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Peter Y. A. Ryan, Bruce Christianson Enhancements to Prepare-and-Measure Based QKD Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Peter Y. A. Ryan Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Matt Blaze The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Paul Syverson Paul Revere Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Sandy Clark, Matt Blaze, Jonathan M. Smith The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Paul Syverson Paul Revere Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Bruce Christianson Introduction: Bringing Protocols to Life (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Bruno Blanchet Using Horn Clauses for Analyzing Security Protocols. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Riccardo Focardi, Matteo Maffei Types for Security Protocols. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Gavin Lowe Analysing Security Protocols using CSP. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska 10051 Executive Summary - Quantitative and Qualitative Analysis of Network Protocols. Search on Bibsonomy Quantitative and Qualitative Analysis of Network Protocols The full citation details ... 2010 DBLP  BibTeX  RDF
28Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska 10051 Abstracts Collection - Quantitative and Qualitative Analysis of Network Protocols. Search on Bibsonomy Quantitative and Qualitative Analysis of Network Protocols The full citation details ... 2010 DBLP  BibTeX  RDF
28Sjouke Mauw Security Protocols for Secret Santa (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Sjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan Security Protocols for Secret Santa. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Michael Backes 0001, Matteo Maffei Design and Verification of Anonymous Trust Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Michael Backes 0001 Design and Verification of Anonymous Trust Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Arjen Hommersom, Perry Groot, Peter J. F. Lucas, Mar Marcos, Begoña Martínez-Salvador A Constraint-based Approach to Medical Guidelines and Protocols. Search on Bibsonomy Computer-based Medical Guidelines and Protocols The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28David Domínguez, Carlos Fernández-Llatas, Teresa Meneu, Juan Bautista Mocholí, Riccardo Serafin Medical Guidelines for the Patient: Introducing the Life Assistance Protocols. Search on Bibsonomy Computer-based Medical Guidelines and Protocols The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license