|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
30 | Brian Monahan |
From Security Protocols to Systems Security (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 323-323, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | N. Asokan, Valtteri Niemi, Kaisa Nyberg |
Man-in-the-Middle in Tunnelled Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 28-41, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Bruce Christianson |
Where Have All the Protocols Gone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 1-2, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Mike Burmester, Alec Yasinsac |
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 274-282, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | James P. G. Sterbenz |
Protocols for High-Speed Networks: A Brief Retrospective Survey of High-Speed Networking Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols for High-Speed Networks ![In: Protocols for High Speed Networks, 7th IFIP/IEEE International Workshop, PfHSN 2002, Berlin, Germany, April 22-24, 2002, Proceedings, pp. 243-266, 2002, Springer, 3-540-43658-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 27-39, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Tatsuo Nakajima |
Practical Explicit Binding Interface for Supporting Multiple Transport Protocols in a CORBA System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 220-229, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
practical explicit binding interface, multiple transport protocols, CORBA system, standard CORBA interfaces, application portability, extended interface, omniORB2, CORBA 2.0 compliant system, AT? Laboratories, Cambridge, QoS, transport protocols, transport protocol, object model, software portability, network interfaces, distributed object management, connection management |
29 | Ran Canetti, Hugo Krawczyk |
Universally Composable Notions of Key Exchange and Secure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 337-351, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security |
29 | Reiner Dojen, Tom Coffey |
The concept of layered proving trees and its application to the automation of security protocol verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(3), pp. 287-311, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
automated protocol verification, logic-based verification of security protocols, cryptography, Security protocols, cryptographic protocols |
29 | Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Shahzad Ali Malik |
An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 360-364, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
end-to-end solutions, service disruption time, performance analysis, TCP, mobility management |
29 | Tri Pham, Eun Jik Kim, W. Melody Moh |
On Data Aggregation Quality and Energy Efficiency of Wireless Sensor Network Protocols - Extended Summary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 1st International Conference on Broadband Networks (BROADNETS 2004), 25-29 October 2004, San Jose, CA, USA, pp. 730-732, 2004, IEEE Computer Society, 0-7695-2221-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ryan G. Lane, Scott Daniels, Xin Yuan |
An Empirical Study of Reliable Multicast Protocols over Ethernet - Connected Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: Proceedings of the 2001 International Conference on Parallel Processing, ICPP 2002, 3-7 September 2001, Valencia, Spain, pp. 553-560, 2001, IEEE Computer Society, 0-7695-1257-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Ralf Küsters, Max Tuengerthal |
Computational soundness for key exchange protocols with symmetric encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 91-100, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
simulation-based security, cryptographic protocols, computational soundness |
28 | Jie Feng, Derek L. Eager, Dwight J. Makaroff |
Aggregation Protocols for High Rate, Low Delay Data Collection in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 26-39, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
aggregation protocols, performance evaluation, sensor networks |
28 | Ton van Deursen, Sasa Radomirovic |
Algebraic Attacks on RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 38-51, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID, Formal verification, security protocols, attacks, algebraic methods |
28 | Dengguo Feng, Weidong Chen |
Modular approach to the design and analysis of password-based security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 381-398, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
weak computational indistinguishability, random oracle model (ROM), provable security, security protocols, standard model |
28 | Janica Edmonds, Mauricio Papa, Sujeet Shenoi |
Security Analysis of Multilayer SCADA Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 205-221, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multilayer protocols, Modbus TCP, formal methods, security analysis |
28 | Dereje H. Woldegebreal, Stefan Valentin, Holger Karl |
Outage probability analysis of cooperative transmission protocols without and with network coding: inter-user channels based comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2007, Chania, Crete Island, Greece, October 22-26, 2007, pp. 36-44, 2007, ACM, 978-1-59593-851-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
static and adaptive protocols, network coding, performance comparison, outage probability, cooperative transmission |
28 | François Ingelrest, David Simplot-Ryl, Ivan Stojmenovic |
Optimal Transmission Radius for Energy Efficient Broadcasting Protocols in Ad Hoc and Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(6), pp. 536-547, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
energy efficient broadcasting, optimal transmission radius, localized communication protocols, sensor networks, Ad hoc networks |
28 | Graham Steel, Alan Bundy |
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 36(1-2), pp. 149-176, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptographic security protocols, counterexamples, superposition |
28 | Xiao-Hui Lin 0001, Yu-Kwong Kwok, Vincent K. N. Lau |
A Quantitative Comparison of Ad Hoc Routing Protocols with and without Channel Adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 4(2), pp. 111-128, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
channel adaptation, ad hoc networks, Mobile computing, routing protocols, on-demand routing |
28 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying electronic voting protocols in typed MSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 35-39, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting |
28 | Jorge Real, Alfons Crespo |
Mode Change Protocols for Real-Time Systems: A Survey and a New Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Real Time Syst. ![In: Real Time Syst. 26(2), pp. 161-197, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
mode change protocols, real-time scheduling, resource sharing, multimoded systems, offsets |
28 | Sukumar Ghosh, Kevin M. Lillis, Saurav Pandit, Sriram V. Pemmaraju |
Robust Topology Control Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OPODIS ![In: Principles of Distributed Systems, 8th International Conference, OPODIS 2004, Grenoble, France, December 15-17, 2004, Revised Selected Papers, pp. 94-109, 2004, Springer, 3-540-27324-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
topology control protocols, fault-tolerance, robustness, Ad-hoc wireless networks, k-connectivity |
28 | Shaobin Wang, Fan Hong, Xian Zhu |
Optimistic Fair-exchange Protocols Based on DSA Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2004 IEEE International Conference on Services Computing (SCC 2004), 15-18 September 2004, Shanghai, China, pp. 498-501, 2004, IEEE Computer Society, 0-7695-2225-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
DSA signatures, E-commerce, multi-signatures, Fair-exchange protocols |
28 | Jonathan Billington, Guy Edward Gallasch |
How Stop and Wait Protocols Can Fail over the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29 - October 2, 2003, Proceedings, pp. 209-223, 2003, Springer, 3-540-20175-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Stop and Wait Protocols, Protocol Analysis and Verification, TCP, Coloured Petri Nets, State space methods |
28 | Vikas Jha, Rajive L. Bagrodia |
Simultaneous events and lookahead in simulation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 10(3), pp. 241-267, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
conditional event, null message, optimistic, simulation protocols, simultaneous events, time ties, time warp, lookahead, conservative |
28 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(3), pp. 230-268, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
28 | Gert Florijn |
Object Protocols as Functional Parsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'95 - Object-Oriented Programming, 9th European Conference, Århus, Denmark, August 7-11, 1995, Proceedings, pp. 351-373, 1995, Springer, 3-540-60160-0. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
interface definitions, protocols, functional programming, service definitions |
28 | Michael Roe |
Panel Session: Is Protocol Modelling Finished? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 213-217, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Michael Roe |
Authentication and Naming (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 20-23, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Pekka Nikander, Kristiina Karvonen |
Users and Trust in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 24-35, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Yi Deng 0002, Dongdai Lin |
Novel Omega-protocols for NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(1), pp. 40-52, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
?-protocols, ?-protocols, Hamiltonian cycle, concurrent zero knowledge |
28 | Juan Manuel Serrano, Sascha Ossowski |
A semantic framework for the recursive specification of interaction protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 451-456, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
recursive definitions, standards for agents and MAS, interaction protocols, agent-based software engineering, agent communication languages and protocols, organisational models |
28 | Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson |
A calculus for control flow analysis of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(3-4), pp. 145-167, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Flow logic, Static analysis, Security protocols, Cryptographic protocols, Process calculi |
28 | David Polock, Dieter Zöbel |
Conformance testing of priority inheritance protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 7th International Workshop on Real-Time Computing and Applications Symposium (RTCSA 2000), 12-14 December 2000, Cheju Island, South Korea, pp. 404-408, 2000, IEEE Computer Society, 0-7695-0930-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
priority inheritance protocols, priority inversion problem, protocol interfaces, predictability criteria, scheduling, real-time systems, real time systems, protocols, operating systems, conformance testing, conformance testing, run-time systems, test suites, application programmer |
28 | Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire |
Hop Integrity in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Eighth Annual International Conference on Network Protocols, ICNP 2000, 14-17 November, 2000, Osaka, Japan, pp. 3-11, 2000, IEEE Computer Society, 0-7695-0921-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
hop integrity, secret exchange protocol, weak integrity protocol, strong integrity protocol, stateless protocol, protocols, network security, Transmission Control Protocol, computer networks, computer networks, TCP/IP, transport protocols, Internet Protocol, network protocol, security of data, router, telecommunication network routing, telecommunication security, message transmission |
28 | Gavin Lowe |
Some new attacks upon security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 162-169, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authentication, security protocols, public key cryptography, access protocols, cryptographic key |
28 | W. Melody Moh, Yu-Feng Chung, Teng-Sheng Moh, Joanna Wang |
Evaluation of high speed LAN protocols as multimedia carriers . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 1996 International Conference on Computer Design (ICCD '96), VLSI in Computers and Processors, October 7-9, 1996, Austin, TX, USA, Proceedings, pp. 93-98, 1996, IEEE Computer Society, 0-8186-7554-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
high speed LAN protocols, multimedia carriers, full-motion video, 100 Base-T Fast Ethernet, Ethernet++, 100 VG-AnyLAN, protocols, animation, images, audio, graphics, voice |
28 | W. Melody Moh, Yu-Jen Chien, Irene Zhang, Teng-Sheng Moh |
Delay performance evaluation of high speed protocols for multimedia communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 352, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
delay performance evaluation, high speed protocols, delay fairness, worst-case delay performance, distributed queue dual bus, CRMA, cyclic reservation multiple access, DQMA, distributed queue multiple access, FDQ, fair distributed queue, heavy network load, reservation-based protocols, throughput, multimedia communication, multimedia communication, multimedia traffic, quality of service requirements, DQDB, access delay, message delay, heterogeneous traffic |
28 | Linda A. Ness |
L.0: A Truly Concurrent Executable Temporal Logic Language for Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(4), pp. 410-423, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
L.0, truly concurrent executable temporal logic language, true concurrency model, execution algorithm, standard imperative programming, state predicates, equality predicates, hierarchical message structure, Futurebus+, simulation, protocols, protocols, specification, temporal logic, specification languages, simulation languages |
28 | A. Udaya Shankar, Simon S. Lam |
Construction of Network Protocols by Stepwise Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
REX Workshop ![In: Stepwise Refinement of Distributed Systems, Models, Formalisms, Correctness, REX Workshop, Mook, The Netherlands, May 29 - June 2, 1989, Proceedings, pp. 669-695, 1989, Springer, 3-540-52559-9. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
distributed systems, Specification, refinement, transport protocols, sliding window protocols |
28 | Alessandro Brawerman, Douglas M. Blough, Benny Bing |
Securing the download of radio configuration files for software defined radio devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Management & Wireless Access Protocols ![In: Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 98-105, 2004, ACM, 1-58113-920-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
analysis of protocols, radio configuration, security and privacy issues and software |
28 | A. W. Roscoe 0001 |
Intensional specifications of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 28-38, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols |
28 | H. Paul Lin, Harry E. Stovall III |
Self-Synchronizing Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 38(5), pp. 609-625, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
self-synchronizing communication protocols, synchronization problems, synchronization errors, process collision, conflicting messages, operating protocols, CCITT X.21, session control protocol, IBM System Network Architecture, protocols, standardization, collisions detection, synchronisation, protocol design, collisions resolution, SNA, message transmission, synchronization mechanism, SSPs |
28 | Lorenzo De Carli, Yi Pan, Amit Kumar 0007, Cristian Estan, Karthikeyan Sankaralingam |
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2009 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Barcelona, Spain, August 16-21, 2009, pp. 207-218, 2009, ACM, 978-1-60558-594-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
high-speed routers, flexibility, dataflow, forwarding, lookup, tiled architectures |
28 | Gurdip Singh |
A Methodology for Designing Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, London, UK, August 31 - September 2, 1994, pp. 245-255, 1994, ACM, 0-89791-682-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Steve Bishop, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith 0008, Keith Wansbrough |
Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005, pp. 265-276, 2005, ACM, 1-59593-009-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
specification, TCP/IP, network protocols, operational semantics, API, conformance testing, higher-order logic, sockets, HOL |
28 | John C. S. Lui, Vishal Misra, Dan Rubenstein |
On the Robustness of Soft State Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 12th IEEE International Conference on Network Protocols (ICNP 2004), 5-8 October 2004, Berlin, Germany, pp. 50-60, 2004, IEEE Computer Society, 0-7695-2161-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
methodology of designing network protocols, robustness, stochastic analysis |
28 | Ernesto Exposito, Patrick Sénac, David Garduno, Michel Diaz, Manuel Urueña |
Deploying New QoS Aware Transport Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMS/PROMS ![In: Protocols and Systems for Interactive Distributed Multimedia, Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems, IDMS/PROMS 2002, Coimbra, Portugal, November 26-29, 2002, Proceedings, pp. 141-153, 2002, Springer, 3-540-00169-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
transport protocols and services, Quality of Service, multimedia applications, active networks |
28 | Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 78-88, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Kieron Ivy Turk |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 89-96, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Sreekanth Malladi, Jonathan K. Millen |
Adapting Constraint Solving to Automatically Analyze UPI Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 276-292, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Véronique Cortier, Itsaka Rakotonirina |
How to Explain Security Protocols to Your Children. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 112-123, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann 0001 |
Security Protocols as Choreographies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 98-111, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Jason Castiglione, Dusko Pavlovic, Peter-Michael Seidel |
Privacy Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 167-191, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | David A. Basin, Lucca Hirschi, Ralf Sasse |
Symbolic Analysis of Identity-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 112-134, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Andrew William Roscoe, Lei Wang |
Key Agreement via Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 156-166, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Musab A. AlTurki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 192-213, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001 |
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 135-147, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Simon N. Foley, Vivien M. Rooney |
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 69-81, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Alexander Hicks, Steven J. Murdoch |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 3-10, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Simon N. Foley, Vivien M. Rooney |
Social Constructionism in Security Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 82-88, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Steven J. Murdoch |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 11-19, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lukas Nemec |
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 93-95, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Steven J. Murdoch |
Incentives in Security Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 142-149, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams |
Non-monotonic Security Protocols and Failures in Financial Intermediation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 45-54, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda |
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 84-92, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Sarah Azouvi, Alexander Hicks, Steven J. Murdoch |
Incentives in Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 132-141, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fabio Massacci |
Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 55-62, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Virgil D. Gligor, Frank Stajano |
Assuring the Safety of Asymmetric Social Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 38-48, 2017, Springer, 978-3-319-71074-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Joan Feigenbaum, Bryan Ford |
Multiple Objectives of Lawful-Surveillance Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 1-8, 2017, Springer, 978-3-319-71074-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Joan Feigenbaum |
Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 9-17, 2017, Springer, 978-3-319-71074-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Frank Stajano |
Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 49-59, 2017, Springer, 978-3-319-71074-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | A. W. Roscoe 0001 |
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers, pp. 198-205, 2016, Springer, 978-3-319-62032-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Khaled Baqer, Ross J. Anderson |
SMAPs: Short Message Authentication Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers, pp. 133-140, 2016, Springer, 978-3-319-62032-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn |
SMAPs: Short Message Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers, pp. 119-132, 2016, Springer, 978-3-319-62032-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | A. W. Roscoe 0001 |
Detecting Failed Attacks on Human-Interactive Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers, pp. 181-197, 2016, Springer, 978-3-319-62032-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Keith Irwin |
Redesigning Secure Protocols to Compel Security Checks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers, pp. 22-29, 2015, Springer, 978-3-319-26095-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Keith Irwin |
Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers, pp. 30-40, 2015, Springer, 978-3-319-26095-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Michele Peroli, Luca Viganò 0001, Matteo Zavatteri |
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 69-90, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Luca Viganò 0001 |
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 91-99, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Peter Y. A. Ryan, Bruce Christianson |
Enhancements to Prepare-and-Measure Based QKD Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 123-133, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Peter Y. A. Ryan |
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 134-142, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Matt Blaze |
The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 64-75, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Paul Syverson |
Paul Revere Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 259-266, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Sandy Clark, Matt Blaze, Jonathan M. Smith |
The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 60-63, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Paul Syverson |
Paul Revere Protocols (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 267-275, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Bruce Christianson |
Introduction: Bringing Protocols to Life (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 1-2, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Bruno Blanchet |
Using Horn Clauses for Analyzing Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 86-111, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Riccardo Focardi, Matteo Maffei |
Types for Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 143-181, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Gavin Lowe |
Analysing Security Protocols using CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 62-85, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska |
10051 Executive Summary - Quantitative and Qualitative Analysis of Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantitative and Qualitative Analysis of Network Protocols ![In: Quantitative and Qualitative Analysis of Network Protocols, 31.01. - 05.02.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
28 | Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska |
10051 Abstracts Collection - Quantitative and Qualitative Analysis of Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantitative and Qualitative Analysis of Network Protocols ![In: Quantitative and Qualitative Analysis of Network Protocols, 31.01. - 05.02.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
28 | Sjouke Mauw |
Security Protocols for Secret Santa (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 185-190, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Sjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan |
Security Protocols for Secret Santa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 175-184, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Michael Backes 0001, Matteo Maffei |
Design and Verification of Anonymous Trust Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 143-148, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Michael Backes 0001 |
Design and Verification of Anonymous Trust Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 149-156, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Arjen Hommersom, Perry Groot, Peter J. F. Lucas, Mar Marcos, Begoña Martínez-Salvador |
A Constraint-based Approach to Medical Guidelines and Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer-based Medical Guidelines and Protocols ![In: Computer-based Medical Guidelines and Protocols: A Primer and Current Trends, pp. 213-222, 2008, IOS Press, 978-1-58603-873-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | David Domínguez, Carlos Fernández-Llatas, Teresa Meneu, Juan Bautista Mocholí, Riccardo Serafin |
Medical Guidelines for the Patient: Introducing the Life Assistance Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer-based Medical Guidelines and Protocols ![In: Computer-based Medical Guidelines and Protocols: A Primer and Current Trends, pp. 193-202, 2008, IOS Press, 978-1-58603-873-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|