„Security Protocol“
Suchergebnisse
1.000+ Treffer
-
Automated Reasoning for Security Protocol Analysis
-
OFMC: A symbolic model checker for security protocols
-
Quantum security analysis of a lattice-based oblivious transfer protocol
-
An Optimized Energy Saving Model for Hybrid Security Protocol in WMN
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX
-
Modern Cryptography – From RSA to Zero-Knowledge and Beyond
-
Mechanized modeling and security proofs for web protocols
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI – Special Issue on Data Warehousing and Knowledge Discovery
-
2nd International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2020)
-
Verification of Mondex electronic purses with KIV: from a security protocol to verified code
-
Codes, Cryptology, and Information Security – First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
-
“Sec-KeyD” an efficient key distribution protocol for critical infrastructures
-
A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol
-
SCADA communication protocols: vulnerabilities, attacks and possible mitigations
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
Security flaws in a recent RFID delegation protocol
-
Model-driven testing of security protocols with SecureMDD
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LIV – Special Issue on Data Management - Principles, Technologies, and Applications