57

When is a key establishment protocol correct?

Year:
2009
Language:
english
File:
PDF, 172 KB
english, 2009
58

A generic solution to realize public verifiability of signcryption

Year:
2006
Language:
english
File:
PDF, 294 KB
english, 2006
59

Trust based pervasive computing

Year:
2006
Language:
english
File:
PDF, 364 KB
english, 2006
65

Fair and Secure Mobile Billing Systems

Year:
2009
Language:
english
File:
PDF, 304 KB
english, 2009
66

Pirate decoder for the broadcast encryption schemes from Crypto 2005

Year:
2007
Language:
english
File:
PDF, 456 KB
english, 2007
68

Multi-item fair exchange scheme

Year:
2002
Language:
english
File:
PDF, 303 KB
english, 2002
75

Analysis and improvement of fair certified e-mail delivery protocol

Year:
2006
Language:
english
File:
PDF, 180 KB
english, 2006
76

Secure multiple-times proxy signature scheme

Year:
2009
Language:
english
File:
PDF, 188 KB
english, 2009
78

Structural and expression analysis of the porcine FUS2 gene

Year:
2004
Language:
english
File:
PDF, 604 KB
english, 2004
89

An empirical study of programming language trends

Year:
2005
Language:
english
File:
PDF, 1.81 MB
english, 2005
92

Cryptographic Protocol || Engineering Principles for Security Design of Protocols

Year:
2012
Language:
english
File:
PDF, 541 KB
english, 2012
93

Cryptographic Protocol || || Front_matter

Year:
2012
Language:
english
File:
PDF, 109 KB
english, 2012
94

Cryptographic Protocol || Introduction of Cryptographic Protocols

Year:
2012
Language:
english
File:
PDF, 362 KB
english, 2012
99

Cryptographic Protocol ||

Year:
2012
Language:
english
File:
PDF, 109 KB
english, 2012