Sciweavers

3751 search results - page 14 / 751
» Events in security protocols
Sort
View
96
Voted
CSFW
1994
IEEE
15 years 6 months ago
A Model of Computation for the NRL Protocol Analyzer
Catherine Meadows
89
Voted
FOSAD
2000
Springer
15 years 5 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
ACISP
2010
Springer
15 years 3 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
SP
2002
IEEE
107views Security Privacy» more  SP 2002»
15 years 1 months ago
P5: A Protocol for Scalable Anonymous Communication
Rob Sherwood, Bobby Bhattacharjee, Aravind Sriniva...