The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protocols with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1975 (15) 1976-1977 (21) 1978-1979 (32) 1980 (28) 1981 (41) 1982 (55) 1983 (113) 1984 (78) 1985 (77) 1986 (142) 1987 (119) 1988 (159) 1989 (229) 1990 (240) 1991 (253) 1992 (299) 1993 (290) 1994 (339) 1995 (391) 1996 (424) 1997 (481) 1998 (573) 1999 (681) 2000 (894) 2001 (993) 2002 (1237) 2003 (1480) 2004 (1961) 2005 (2445) 2006 (2467) 2007 (2537) 2008 (2634) 2009 (1789) 2010 (993) 2011 (944) 2012 (818) 2013 (829) 2014 (790) 2015 (772) 2016 (838) 2017 (794) 2018 (815) 2019 (815) 2020 (825) 2021 (718) 2022 (715) 2023 (674) 2024 (122)
Publication types (Num. hits)
article(9381) book(76) incollection(291) inproceedings(24380) phdthesis(728) proceedings(123)
Venues (Conferences, Journals, ...)
ICNP(1563) CoRR(1027) SIGCOMM(980) Security Protocols Workshop(811) NETWORKING(572) IACR Cryptol. ePrint Arch.(500) FORTE(341) LCN(283) ICC(249) CRYPTO(202) IEEE Trans. Parallel Distribut...(198) ISCC(193) INFOCOM(189) IEEE/ACM Trans. Netw.(184) ICDCS(182) IPDPS(177) More (+10 of total 3896)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25318 occurrences of 6008 keywords

Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Arash Atashpendar Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sandy Clark Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Daniel R. Thomas The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson (eds.) Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, James A. Malcolm (eds.) Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Filip Jurnecka, Martin Stehlík, Vashek Matyás On Node Capturing Attacker Strategies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Daniel R. Thomas Better Authentication Password Revolution by Evolution (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan Remark!: A Secure Protocol for Remote Exams. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Henry Tan, Micah Sherr Censorship Resistance as a Side-Effect (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore 0002, L. Jean Camp, Kevin Benton, Ross J. Anderson Collaborating with the Enemy on Network Management. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Vit Bukac, Vaclav Lorenc, Vashek Matyás Red Queen's Race: APT Win-Win Game. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Dieter Gollmann Why Bother Securing DNS? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Dieter Gollmann Why Bother Securing DNS? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Shishir Nagaraja On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Dancing with the Adversary: A Tale of Wimps and Giants. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Henry Tan, Micah Sherr Censorship Resistance as a Side-Effect. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Rosario Giustolisi Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Frank Stajano Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Simon N. Foley Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Joseph Gardiner, Shishir Nagaraja On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Joan Feigenbaum, Jérémie Koenig On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Max Spencer Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Vit Bukac Red Queen's Race: APT Win-Win Game (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Partha Das Chowdhury, Bruce Christianson Beyond Trust. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Olgierd Pieczul, Simon N. Foley Collaborating as Normal: Detecting Systemic Anomalies in Your Partner. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Daniel R. Thomas, Alastair R. Beresford Better Authentication: Password Revolution by Evolution. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Partha Das Chowdhury Beyond Trust (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau, Andrew Miller 0001 Fawkescoin - A Cryptocurrency Without Public-Key Cryptography. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Yvo Desmedt On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Aaron D. Jaggard, Rebecca N. Wright Strange Bedfellows: How and When to Work with Your Enemy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Joan Feigenbaum, Jérémie Koenig On the Feasibility of a Technological Response to the Surveillance Morass. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Rebecca N. Wright Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Filip Jurnecka On Node Capturing Attacker Strategies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Yvo Desmedt On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson, Chris Hall Collaborating with the Enemy on Network Management (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Frank Stajano, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington Bootstrapping Adoption of the Pico Password Replacement System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.) Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau (eds.) Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Bruce Christianson Introduction: What's Happening on the Other Channel? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Rushil Khurana, Shishir Nagaraja Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Jun Zhao 0007, Virgil D. Gligor, Adrian Perrig, James Newsome ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie Towards a Theory of Application Compartmentalisation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Shishir Nagaraja Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Alec Yasinsac Independent Computations for Safe Remote Electronic Voting. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Francesco Bergadano Communication Setup in Anonymous Messaging (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Dongting Yu Authentication for Resilience: The Case of SDN (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Rubin Xu Towards a Stronger Location Integrity (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Ariel Stulman Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Dongting Yu, Andrew W. Moore 0002, Chris Hall, Ross J. Anderson Authentication for Resilience: The Case of SDN. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Bin B. Zhu, Jeff Yan Towards New Security Primitives Based on Hard AI Problems. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Francesco Bergadano Communication Setup in Anonymous Messaging. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Petr Svenda, Václav Matyás On the Origin of Yet another Channel. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Mohammed H. Almeshekah Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Petr Svenda On the Origin of Yet another Channel (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Robert N. M. Watson Towards a Theory of Application Compartmentalisation (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague Verifiable Postal Voting. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Jeff Yan Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Feng Hao 0001 Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Vanessa Teague End-to-End Verifiable Postal Voting (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Feng Hao 0001, Dylan Clarke, Carlton Shepherd Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Alec Yasinsac Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Ariel Stulman, Jonathan Lahav, Avraham Shmueli Spraying Diffie-Hellman for Secure Key Exchange in MANETs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Rubin Xu, Dongting Yu Towards a Stronger Location Integrity. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson (eds.) Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Todd R. Andel, Alec Yasinsac Secure Internet Voting Protocol for Overseas Military Voters. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig Street-Level Trust Semantics for Attribute Authentication. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Todd R. Andel Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Feng Hao 0001, Brian Randell, Dylan Clarke Self-enforcing Electronic Voting. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Dylan Clarke Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau Statistical Metrics for Individual Password Strength (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Feng Hao 0001 Self-enforcing Electronic Voting (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Mauro Conti Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Virgil D. Gligor Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Joseph Bonneau Statistical Metrics for Individual Password Strength. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson, Robert N. M. Watson Stayin' Alive: Aliveness as an Alternative to Authentication. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Jonathan Anderson Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Frank Stajano Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Shah Mahmood, Yvo Desmedt Usable Privacy by Visual and Interactive Control of Information Flow. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Dylan Clarke, Feng Hao 0001, Brian Randell Analysis of Issues and Challenges of E-Voting in the UK. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson Protocol Governance: The Elite, or the Mob? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Shah Mahmood Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Yuko Murayama Usability Issues in Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Oliver Stannard, Frank Stajano Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Yuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka Usability Issues in Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Ross J. Anderson Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Phillip J. Brooke Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Phillip J. Brooke, Richard F. Paige, Christopher Power Approaches to Modelling Security Scenarios with Domain-Specific Languages. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano (eds.) Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.) Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Mark Dermot Ryan, Ben Smyth Applied pi calculus. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Anupam Datta, John C. Mitchell, Arnab Roy 0001, Stephan Hyeonjun Stiller Protocol Composition Logic. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi Computational Soundness - The Case of Diffie-Hellman Keys. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Steve A. Schneider Security Analysis using Rank Functions in CSP. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Véronique Cortier, Steve Kremer Introduction. Search on Bibsonomy Formal Models and Techniques for Analyzing Security Protocols The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 34979 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license