Results 261 to 269 of about 1,926,564 (269)
Some of the next articles are maybe not open access.
A cryptographic protocol to protect MPLS labels
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003David A. Barlow, V. Vassiliou, H. Owen
semanticscholar +1 more source
Childhood Cancer: Patterns of Protocol Participation in a National Survey
Ca-A Cancer Journal for Clinicians, 2001exaly
Invariant generation techniques in cryptographic protocol analysis
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000C. Meadows
semanticscholar +1 more source
Using logics to detect implementation-dependent flaws [cryptographic protocol design]
Proceedings of 9th Annual Computer Security Applications Conference, 1993U. Carlsen
semanticscholar +1 more source
A protocol for isolation and culture of mesenchymal stem cells from mouse compact bone
Nature Protocols, 2010Dingdingabc Zhu +2 more
exaly
On Protocol-Independent Data Redundancy Elimination
IEEE Communications Surveys and Tutorials, 2014Nirwan Ansari
exaly
A survey of security techniques for the border gateway protocol (BGP)
IEEE Communications Surveys and Tutorials, 2009exaly
A protocol for data exploration to avoid common statistical problems
Methods in Ecology and Evolution, 2010exaly

