Sciweavers

5324 search results - page 69 / 1065
» Internet Security Protocols
Sort
View
96
Voted
CCS
2007
ACM
15 years 9 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
CCS
2001
ACM
15 years 7 months ago
Inductive methods and contract-signing protocols
Rohit Chadha, Max I. Kanovich, Andre Scedrov
78
Voted
AGENTS
2000
Springer
15 years 7 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...
110
Voted
ACISP
1999
Springer
15 years 7 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...
99
Voted
CCS
2009
ACM
15 years 6 months ago
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering
Juan Caballero, Pongsin Poosankam, Christian Kreib...