Sciweavers

5488 search results - page 22 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
96
Voted
ACISP
2009
Springer
15 years 10 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
102
Voted
CSFW
2008
IEEE
15 years 10 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin
94
Voted
CSFW
2007
IEEE
15 years 10 months ago
Electing the Doge of Venice: Analysis of a 13th Century Protocol
Miranda Mowbray, Dieter Gollmann
90
Voted
IEEEARES
2007
IEEE
15 years 10 months ago
A Human-Verifiable Authentication Protocol Using Visible Laser Light
Rene Mayrhofer, Martyn Welch
112
Voted
SPW
2005
Springer
15 years 9 months ago
The Initial Costs and Maintenance Costs of Protocols
Ross Anderson