Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3504
search results - page 26 / 701
»
Secure protocol composition
Sort
relevance
views
votes
recent
update
View
thumb
title
98
click to vote
IEEEARES
2007
IEEE
91
views
Security Privacy
»
more
IEEEARES 2007
»
A Human-Verifiable Authentication Protocol Using Visible Laser Light
15 years 10 months ago
Download
www.mayrhofer.eu.org
Rene Mayrhofer, Martyn Welch
claim paper
Read More »
121
click to vote
SPW
2005
Springer
114
views
Security Privacy
»
more
SPW 2005
»
The Initial Costs and Maintenance Costs of Protocols
15 years 10 months ago
Download
www.cl.cam.ac.uk
Ross Anderson
claim paper
Read More »
136
click to vote
SPW
2005
Springer
115
views
Security Privacy
»
more
SPW 2005
»
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
15 years 10 months ago
Download
www.cl.cam.ac.uk
Richard Clayton
claim paper
Read More »
110
click to vote
WISA
2004
Springer
119
views
Security Privacy
»
more
WISA 2004
»
A New k-Anonymous Message Transmission Protocol
15 years 9 months ago
Download
dasan.sejong.ac.kr
Gang Yao, Dengguo Feng
claim paper
Read More »
139
click to vote
AGENTS
2001
Springer
202
views
Security Privacy
»
more
AGENTS 2001
»
Designing and executing protocols using the event calculus
15 years 9 months ago
Download
www.cmpe.boun.edu.tr
Pinar Yolum, Munindar P. Singh
claim paper
Read More »
« Prev
« First
page 26 / 701
Last »
Next »