|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 387 occurrences of 262 keywords
|
|
|
Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Michaël Rusinowitch, Mathieu Turuani |
Protocol Insecurity with Finite Number of Sessions is NP-Complete. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Lawrence C. Paulson |
SET Cardholder Registration: The Secrecy Proofs. |
IJCAR |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Daniel F. Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid |
Autonomic Response to Distributed Denial of Service Attacks. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Sung-Ming Yen |
Practical Key Recovery Schemes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Yevgeniy Dodis, Amit Sahai, Adam D. Smith |
On Perfect and Adaptive Security in Exposure-Resilient Cryptography. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Yannick Chevalier, Laurent Vigneron |
A Tool for Lazy Verification of Security Protocols. |
ASE |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Giorgio Delzanno, Sandro Etalle |
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. |
LOPSTR |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Sang-Min Park, Kyung-Yong Chwa, Jae-Ha Lee |
Characterization of Rooms Searchable by Two Guards. |
ISAAC |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Kamel Adi, Mourad Debbabi, Mohamed Mejri |
A New Logic for Electronic Commerce Protocols. |
AMAST |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Catherine Meadows 0001 |
Invariant Generation Techniques in Cryptographic Protocol Analysis. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov |
Relating Strands and Multiset Rewriting for Security Protocol Analysis. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Giampaolo Bella |
Lack of Explicitness Strikes Back. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Giampaolo Bella |
Lack of Explicitness Strikes Back (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Thomas Genet, Francis Klay |
Rewriting for Cryptographic Protocol Verification. |
CADE |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Johann Schumann |
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols. |
CAV |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Riccardo Focardi, Fabio Martinelli |
A Uniform Approach for the Definition of Security Properties. |
World Congress on Formal Methods |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Zhongzhi Shi, Ju Wang, Hu Cao |
The Security Mechanism In Multiagent System AOSDE. |
PRIMA |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Luciano Paschoal Gaspary, Liane Margarida Rockenbach Tarouco |
Characterization and Measurements of Enterprise Network Traffic with RMON 2. |
DSOM |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Richard C. Linger, Nancy R. Mead, Howard F. Lipson |
Requirements Definition for Survivable Network Systems. |
ICRE |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Mihir Bellare, Russell Impagliazzo, Moni Naor |
Does Parallel Repetition Lower the Error in Computationally Sound Protocols? |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
|
10 | Chun-I Fan, Chin-Laung Lei |
A Multi-Recastable Ticket Scheme for Electronic Elections. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
10 | Daniel E. O'Leary |
Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines. |
IEEE Expert |
1995 |
DBLP DOI BibTeX RDF |
|
10 | Chih-Hung Wang, Tzonelih Hwang, Jiun-Jang Tsai |
On the Matsumoto and Imai's Human Identification Scheme. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
10 | Robert Cooper |
Experience with Causally and Totally Ordered Communication Support, A cautionary tale. |
ACM SIGOPS Oper. Syst. Rev. |
1994 |
DBLP DOI BibTeX RDF |
|
10 | Peter Gemmell, Moni Naor |
Codes for Interactive Authentication. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
10 | Jean-Charles Fabre, Brian Randell |
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
10 | George I. Davida, Yvo Desmedt, René Peralta 0001 |
A Key Distribution System Based On Any One-Way Function (Extended Abstract). |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
10 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
10 | Andreas Pfitzmann, Michael Waidner |
Networks Without User Observability: Design Options. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #629 of 629 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|