Results 301 to 310 of about 1,901,421 (313)
Some of the next articles are maybe not open access.

Advanced method for cryptographic protocol verification

J. Comput. Methods Sci. Eng., 2006
Nabil El-Kadhi, H. El-Gendy
semanticscholar   +1 more source

A protocol for rapid generation of recombinant adenoviruses using the AdEasy system

Nature Protocols, 2007
Zhong-Liang Deng   +2 more
exaly  

Cryptographic Protocol to Establish Trusted History of Interactions

European Workshop on Security in Ad-hoc and Sensor Networks, 2006
S. Galice   +3 more
semanticscholar   +1 more source

A cryptographic protocol to protect MPLS labels

IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003
David A. Barlow, V. Vassiliou, H. Owen
semanticscholar   +1 more source

Invariant generation techniques in cryptographic protocol analysis

Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000
C. Meadows
semanticscholar   +1 more source

A protocol for isolation and culture of mesenchymal stem cells from mouse compact bone

Nature Protocols, 2010
Dingdingabc Zhu   +2 more
exaly  

Using logics to detect implementation-dependent flaws [cryptographic protocol design]

Proceedings of 9th Annual Computer Security Applications Conference, 1993
U. Carlsen
semanticscholar   +1 more source

On Protocol-Independent Data Redundancy Elimination

IEEE Communications Surveys and Tutorials, 2014
Nirwan Ansari
exaly  

Home - About - Disclaimer - Privacy