The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Juraj Hromkovic Randomized Communication Protocols (A Survey). Search on Bibsonomy SAGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF two-party protocols, communication complexity, Randomized computing
21Bhed Bahadur Bista, Y. Ujiie, K. Furuya, Kaoru Takahashi, Norio Shiratori Support System for Constructing Communication Services and Protocols Based on Compositional Approach. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF communication service design, communication protocol design, compositional approach, sequential composition, protocols, LOTOS, service specifications, protocol specifications, parallel composition
21Hisaaki Katagiri, Keiichi Yasumoto, Akira Kitajima, Teruo Higashino, Kenichi Taniguchi Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization. Search on Bibsonomy DAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF concurrent EFSMs, mutli-way synchronization, high-level synthesis, communication protocols, LOTOS, Lotos
21Mustaque Ahamad, Rammohan Kordale Scalable Consistency Protocols for Distributed Services. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Scalable services, caching, replication, distributed objects, consistency protocols
21Purnendu Sinha, Neeraj Suri On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols. Search on Bibsonomy RTSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Dependable Real-time Protocols, Scheduling, Formal Techniques
21Colin Boyd A Class of Flexible and Efficient Key Management Protocols. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authentication, key management, secure protocols
21K. H. Kim, Carlos Serro Can Real-Time Local Area Network Protocols Be Made Robust? Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF CSMA/DCR protocol, Robust real-time protocols, Real-time Local Area Networks, Temporary fault, Link failure, Permanent fault
21Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson (eds.) Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Partha Das Chowdhury Towards Human-Centric Endpoint Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Daniel Hugenroth Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson, Nicholas Boucher If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Frank Stajano Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Agata Kruzikova Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Arastoo Bozorgi, Jonathan Anderson Blind Auditing and Probabilistic Access Controls. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Agata Kruzikova, Vashek Matyas, Milan Broz Authentication of IT Professionals in the Wild - A Survey. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor, Adrian Perrig, David A. Basin Determining an Economic Value of High Assurance for Commodity Software Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, Alex Shafarenko Transporting a Secret Using Destructively-Read Memory. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson, Nicholas Boucher If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jenny Blessing One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Christelle Gloor Trusted Introductions for Secure Messaging (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Frank Stajano Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Alex Shafarenko Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid Towards Human-Centric Endpoint Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Harry Halpin Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Adrian Perrig Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Christelle Gloor, Adrian Perrig Trusted Introductions for Secure Messaging. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jenny Blessing, Ross Anderson 0001 One Protocol to Rule Them All? On Securing Interoperable Messaging. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jessica Monteith Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Harry Halpin, Andrei Serjantov Incentives and Censorship Resistance for Mixnets Revisited. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Daniel Dougherty, José Meseguer 0001, Sebastian Alexander Mödersheim, Paul D. Rowe (eds.) Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Abigail Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, Shriram Krishnamurthi Prototyping Formal Methods Tools: A Protocol Analysis Case Study. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21John D. Ramsdell Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Prajna Bhandary, Edward Zieglar, Charles Nicholas Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Riccardo Focardi, Flaminia L. Luccio Secure Key Management Policies in Strand Spaces. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do 0001, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele A Tutorial-Style Introduction to DY*. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Pierpaolo Degano, Letterio Galletta, Selene Gerali Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Kangsoo Jung, Sayan Biswas, Catuscia Palamidessi Establishing the Price of Privacy in Federated Data Trading. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Daniel J. Dougherty Model Finding for Exploration. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Alessandra Di Pierro, Massimiliano Incudini Quantum Machine Learning and Fraud Detection. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott On the Complexity of Verification of Time-Sensitive Distributed Systems. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Mohammad M. Ahmadpanah, Musard Balliu, Daniel Hedin, Lars Eric Olsson, Andrei Sabelfeld Securing Node-RED Applications. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Dale M. Johnson Formal Methods and Mathematical Intuition. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson Benign Interaction of Security Domains. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Sebastian Mödersheim, Jorge Cuéllar Three Branches of Accountability. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark A Declaration of Software Independence. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Dusko Pavlovic Probabilistic Annotations for Protocol Models - Dedicated to Joshua Guttman. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Paul Syverson Principles of Remote Sattestation. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Sylvan Pinsky Joshua Guttman: Pioneering Strand Spaces. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Damián Aparicio-Sánchez, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001, Julia Sapiña Protocol Analysis with Time and Space. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Paul D. Rowe On Orderings in Security Models. Search on Bibsonomy Protocols, Strands, and Logic The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás (eds.) Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Joshua D. Guttman, Carl E. Landwehr, José Meseguer 0001, Dusko Pavlovic (eds.) Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza Symbolic Timed Trace Equivalence. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Jonathan K. Millen A Long, Slow Conversation. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Erin Hanna, Christopher Lynch, David Jaz Myers, Corey Richardson Finding Intruder Knowledge with Cap-Matching. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer Enrich-by-Need Protocol Analysis for Diffie-Hellman. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Paul Syverson Key Reminiscences. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Véronique Cortier, Pierrick Gaudry, Stéphane Glondu Belenios: A Simple Private and Verifiable Electronic Voting System. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Matteo Busi 0001, Pierpaolo Degano, Letterio Galletta Robust Declassification by Incremental Typing. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider JRIF: Reactive Information Flow Control for Java. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Sylvan Pinsky Cathy Meadows: A Central Figure in Protocol Analysis. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Santiago Escobar 0001, José Meseguer 0001 Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method. Search on Bibsonomy Foundations of Security, Protocols, and Equational Reasoning The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov Snitches Get Stitches: On the Difficulty of Whistleblowing. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Chan Nam Ngo Affordable Security or Big Guy vs Small Guy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Prashant Anantharaman Mismorphism: The Heart of the Weird Machine (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Laurent Chuat Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Laurent Chuat, Sarah Plocher, Adrian Perrig Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Vijay Kothari, Michael C. Millian Human-Computability Boundaries (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Sasa Radomirovic Shaping Our Mental Model of Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Vasilios Mavroudis Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith Mismorphism: The Heart of the Weird Machine. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig Evolution of SSL/TLS Indicators and Warnings in Web Browsers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Vasilios Mavroudis Bounded Temporal Fairness for FIFO Financial Markets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Lydia Kraus Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith Human-Computability Boundaries. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson Challenges in Designing a Distributed Cryptographic File System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Diana A. Vasile Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor A Rest Stop on the Unending Road to Provable Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Sasa Radomirovic Shaping Our Mental Model of Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.) Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor, Maverick Woo Requirements for Root of Trust Establishment. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Graham Rymer, David Llewellyn-Jones Raven Authentication Service - Attacks and Countermeasures. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Kat Krol Intentionality and Agency in Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Joan Feigenbaum, Daniel J. Weitzner On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21T. Mark A. Lomas User Authentication for the Internet of Things (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Erinn Atwater, Ian Goldberg Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Patrick McCorry, Malte Möser, Syed Taha Ali Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Patrick McCorry Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Taciane Martimiano, Jean Everson Martina Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Ross Anderson 0001, Ilia Shumailov, Mansoor Ahmed-Rengers Making Bitcoin Legal. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano Intentionality and Agency in Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Erinn Atwater, Ian Goldberg Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license