Sciweavers

5324 search results - page 69 / 1065
» Internet Security Protocols
Sort
View
107
Voted
CCS
2007
ACM
15 years 10 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
117
Voted
CCS
2001
ACM
15 years 8 months ago
Inductive methods and contract-signing protocols
Rohit Chadha, Max I. Kanovich, Andre Scedrov
AGENTS
2000
Springer
15 years 8 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...
ACISP
1999
Springer
15 years 8 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...