Sciweavers

5324 search results - page 69 / 1065
» Internet Security Protocols
Sort
View
105
Voted
CCS
2007
ACM
15 years 10 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
116
Voted
CCS
2001
ACM
15 years 8 months ago
Inductive methods and contract-signing protocols
Rohit Chadha, Max I. Kanovich, Andre Scedrov
87
Voted
AGENTS
2000
Springer
15 years 8 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...
119
Voted
ACISP
1999
Springer
15 years 8 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...