Results 261 to 269 of about 1,926,564 (269)
Some of the next articles are maybe not open access.

A cryptographic protocol to protect MPLS labels

IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003
David A. Barlow, V. Vassiliou, H. Owen
semanticscholar   +1 more source

Invariant generation techniques in cryptographic protocol analysis

Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000
C. Meadows
semanticscholar   +1 more source

Using logics to detect implementation-dependent flaws [cryptographic protocol design]

Proceedings of 9th Annual Computer Security Applications Conference, 1993
U. Carlsen
semanticscholar   +1 more source

A protocol for isolation and culture of mesenchymal stem cells from mouse compact bone

Nature Protocols, 2010
Dingdingabc Zhu   +2 more
exaly  

On Protocol-Independent Data Redundancy Elimination

IEEE Communications Surveys and Tutorials, 2014
Nirwan Ansari
exaly  

A survey of security techniques for the border gateway protocol (BGP)

IEEE Communications Surveys and Tutorials, 2009
exaly  

Home - About - Disclaimer - Privacy