Results 301 to 310 of about 1,901,421 (313)
Some of the next articles are maybe not open access.
Advanced method for cryptographic protocol verification
J. Comput. Methods Sci. Eng., 2006Nabil El-Kadhi, H. El-Gendy
semanticscholar +1 more source
A protocol for rapid generation of recombinant adenoviruses using the AdEasy system
Nature Protocols, 2007Zhong-Liang Deng +2 more
exaly
Cryptographic Protocol to Establish Trusted History of Interactions
European Workshop on Security in Ad-hoc and Sensor Networks, 2006S. Galice +3 more
semanticscholar +1 more source
A cryptographic protocol to protect MPLS labels
IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003David A. Barlow, V. Vassiliou, H. Owen
semanticscholar +1 more source
Childhood Cancer: Patterns of Protocol Participation in a National Survey
Ca-A Cancer Journal for Clinicians, 2001exaly
Invariant generation techniques in cryptographic protocol analysis
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 2000C. Meadows
semanticscholar +1 more source
A protocol for isolation and culture of mesenchymal stem cells from mouse compact bone
Nature Protocols, 2010Dingdingabc Zhu +2 more
exaly
Using logics to detect implementation-dependent flaws [cryptographic protocol design]
Proceedings of 9th Annual Computer Security Applications Conference, 1993U. Carlsen
semanticscholar +1 more source
On Protocol-Independent Data Redundancy Elimination
IEEE Communications Surveys and Tutorials, 2014Nirwan Ansari
exaly

