Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2162
search results - page 114 / 433
»
A Meta-Notation for Protocol Analysis
Sort
relevance
views
votes
recent
update
View
thumb
title
70
click to vote
NSF
2001
Springer
175
views
Computer Vision
»
more
NSF 2001
»
Ad Hoc Wireless Networks: Analysis, Protocols, Architecture, and Convergence
15 years 2 months ago
Download
legend.me.uiuc.edu
P. R. Kumar
claim paper
Read More »
63
click to vote
CSFW
2000
IEEE
100
views
Security Privacy
»
more
CSFW 2000
»
Relating Strands and Multiset Rewriting for Security Protocol Analysis
15 years 2 months ago
Download
www.csl.sri.com
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
claim paper
Read More »
57
click to vote
ICPPW
2000
IEEE
100
views
Distributed And Parallel Com...
»
more
ICPPW 2000
»
Bandwidth Usage Analysis of Service Location Protocol
15 years 2 months ago
Download
people.scs.carleton.ca
Michel Barbeau
claim paper
Read More »
69
click to vote
WECWIS
2000
IEEE
113
views
ECommerce
»
more
WECWIS 2000
»
Failure Analysis of an E-Commerce Protocol Using Model Checking
15 years 2 months ago
Download
www.cs.colostate.edu
Indrakshi Ray, Indrajit Ray
claim paper
Read More »
59
click to vote
CAV
1999
Springer
85
views
Hardware
»
more
CAV 1999
»
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols
15 years 2 months ago
Download
ti.arc.nasa.gov
Johann Schumann
claim paper
Read More »
« Prev
« First
page 114 / 433
Last »
Next »