3

A generic security API for symmetric key management on cryptographic devices

Year:
2014
Language:
english
File:
PDF, 1.42 MB
english, 2014
18

A note on maximally repeated sub-patterns of a point set

Year:
2006
Language:
english
File:
PDF, 153 KB
english, 2006
19

Security properties: two agents are sufficient

Year:
2004
Language:
english
File:
PDF, 332 KB
english, 2004
20

Deciding knowledge in security protocols under equational theories

Year:
2006
Language:
english
File:
PDF, 475 KB
english, 2006
22

Safely composing security protocols

Year:
2009
Language:
english
File:
PDF, 669 KB
english, 2009
24

Tree automata with one memory set constraints and cryptographic protocols

Year:
2005
Language:
english
File:
PDF, 704 KB
english, 2005
26

On the Structure of the Ergosurface of Pomeransky-Senkov Black Rings

Year:
2012
Language:
english
File:
PDF, 354 KB
english, 2012
31

C3. Mechanisms of human colon cancer cells sensitization to nitric oxide-induced apoptosis

Year:
2007
Language:
english
File:
PDF, 67 KB
english, 2007
35

Gluing Construction of Initial Data with Kerr–de Sitter Ends

Year:
2013
Language:
english
File:
PDF, 446 KB
english, 2013
40

D'une Rive a l'autre du Saharaby Maurice Cortier

Year:
1909
Language:
english
File:
PDF, 109 KB
english, 1909
41

Modeling and verifying ad hoc routing protocols

Year:
2014
Language:
english
File:
PDF, 969 KB
english, 2014