Sciweavers

5488 search results - page 45 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
88
Voted
SP
2009
IEEE
15 years 10 months ago
Prospex: Protocol Specification Extraction
Paolo Milani Comparetti, Gilbert Wondracek, Christ...
103
Voted
CCS
2007
ACM
15 years 10 months ago
Selecting theories and nonce generation for recursive protocols
Klaas Ole Kürtz, Ralf Küsters, Thomas Wi...
112
Voted
CCS
2001
ACM
15 years 8 months ago
Inductive methods and contract-signing protocols
Rohit Chadha, Max I. Kanovich, Andre Scedrov
82
Voted
AGENTS
2000
Springer
15 years 8 months ago
A Multi-agent system architecture for monitoring medical protocols
Teresa Alsinet, Ramón Béjar, C&egrav...
117
Voted
ACISP
1999
Springer
15 years 8 months ago
Accelerating Key Establishment Protocols for Mobile Communication
Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon, Yookun...