Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5324
search results - page 52 / 1065
»
Internet Security Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
80
click to vote
CCS
2004
ACM
116
views
Security Privacy
»
more
CCS 2004
»
A decision procedure for the verification of security protocols with explicit destructors
15 years 8 months ago
Download
www.lsv.ens-cachan.fr
Stéphanie Delaune, Florent Jacquemard
claim paper
Read More »
97
click to vote
CSFW
1997
IEEE
109
views
Security Privacy
»
more
CSFW 1997
»
Proving Properties of Security Protocols by Induction
15 years 7 months ago
Download
www.cl.cam.ac.uk
Lawrence C. Paulson
claim paper
Read More »
100
click to vote
CSFW
1997
IEEE
114
views
Security Privacy
»
more
CSFW 1997
»
Casper: A Compiler for the Analysis of Security Protocols
15 years 7 months ago
Download
web.comlab.ox.ac.uk
Gavin Lowe
claim paper
Read More »
104
click to vote
CSFW
1996
IEEE
110
views
Security Privacy
»
more
CSFW 1996
»
A High-Throughput Secure Reliable Multicast Protocol
15 years 7 months ago
Download
www.cs.unc.edu
Dalia Malki, Michael K. Reiter
claim paper
Read More »
124
click to vote
SP
2008
IEEE
195
views
Security Privacy
»
more
SP 2008
»
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
15 years 9 months ago
Download
www.cs.umd.edu
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
claim paper
Read More »
« Prev
« First
page 52 / 1065
Last »
Next »