Results 241 to 250 of about 5,550,853 (286)
Some of the next articles are maybe not open access.

Authentication Protocol Analysis

2005
We take a closer look at some of the limitations of current analysis approaches, and mention some work and open problems related to expanding their scope.
openaire   +1 more source

Protocol Analysis

1984
Alan Bundy, Lincoln Wallen
openaire   +1 more source

KaoChow Protocol Timed Analysis

2018
This paper discusses the problem of timed security protocols’ analysis. Delay in the network and encryption and decryption times are very important from a security point of view. This operations’ times may have a significant influence on users’ security. The timed analysis is based on a special formal model and computational structure.
openaire   +1 more source

An overview of precision oncology basket and umbrella trials for clinicians

Ca-A Cancer Journal for Clinicians, 2020
Kristian Thorlund, Edward J Mills
exaly  

An in vitro batch fermentation protocol for studying the contribution of food to gut microbiota composition and functionality

Nature Protocols, 2021
Silvia Molino   +2 more
exaly  

Verbal protocol analysis

2005
Lisanne Bainbridge, Penelope Sanderson
openaire   +1 more source

Khandwalla's protocol analysis

Creativity Research Journal, 1994
openaire   +1 more source

Home - About - Disclaimer - Privacy