Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1490
search results - page 49 / 298
»
The Logic of Authentication Protocols
Sort
relevance
views
votes
recent
update
View
thumb
title
116
Voted
CCS
2001
ACM
144
views
Security Privacy
»
more
CCS 2001
»
The BiBa one-time signature and broadcast authentication protocol
15 years 8 months ago
Download
www.ece.cmu.edu
Ï ÒØÖÓ Ù Ø × Ò ØÙÖ × Ñ ¸ Ò Û × Ò ØÙÖ ÓÒרÖÙ Ø ÓÒ Ø Ø Ù× × ÓÒ ¹Û Ý ÙÒ Ø ÓÒ× Û Ø ÓÙØ ØÖ Ô ÓÓÖ׺ ØÙÖ × ÐÓÛ Ú Ö ¬...
Adrian Perrig
claim paper
Read More »
82
Voted
ACSAC
2000
IEEE
102
views
Security Privacy
»
more
ACSAC 2000
»
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor
15 years 8 months ago
Download
security.ece.orst.edu
Murat Aydos, T. Yanik, Çetin Kaya Koç...
claim paper
Read More »
100
click to vote
CAV
1999
Springer
85
views
Hardware
»
more
CAV 1999
»
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols
15 years 7 months ago
Download
ti.arc.nasa.gov
Johann Schumann
claim paper
Read More »
97
Voted
CSFW
1997
IEEE
84
views
Security Privacy
»
more
CSFW 1997
»
Mechanized proofs for a recursive authentication protocol
15 years 7 months ago
Download
www.cl.cam.ac.uk
Lawrence C. Paulson
claim paper
Read More »
116
Voted
ASIAN
2006
Springer
126
views
Algorithms
»
more
ASIAN 2006
»
Certificateless Authenticated Two-Party Key Agreement Protocols
15 years 7 months ago
Download
www.mista.nu
Tarjei K. Mandt, Chik How Tan
claim paper
Read More »
« Prev
« First
page 49 / 298
Last »
Next »