Performance of protocols (Transcript of discussion)

被引:0
|
作者
Roe, M
Lee, S
Christianson, B
Anderson, R
Wheeler, D
Blaze, M
Gollman, D
Gligor, V
Mao, WB
Paulson, L
Kuhn, M
机构
来源
SECURITY PROTOCOLS | 2000年 / 1796卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:147 / 152
页数:6
相关论文
共 50 条
  • [41] Simulating Perceptions of Security (Transcript of Discussion)
    Wernick, Paul
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 69 - 75
  • [42] Making Decryption Accountable (Transcript of Discussion)
    Ryan, Mark D.
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 99 - 108
  • [43] How to Sync with Alice (Transcript of Discussion)
    Hao, Feng
    [J]. SECURITY PROTOCOLS XIX, 2011, 7114 : 179 - 188
  • [44] Pico: No more passwords! (Transcript of discussion)
    University of Cambridge, Cambridge, United Kingdom
    [J]. Lect. Notes Comput. Sci., (82-97):
  • [45] Self Attestation of Things (Transcript of Discussion)
    Das Chowdhury, Partha
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 85 - 92
  • [46] The Dark Side of the Code (Transcript of Discussion)
    Foley, Simon N.
    Pieczul, Olgierd
    [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 12 - 21
  • [47] Modeling Partial Attacks with ALLOY (Transcript of Discussion)
    Lin, Amerson
    [J]. SECURITY PROTOCOLS, 2010, 5964 : 34 - 36
  • [48] A proof of non-repudiation - (Transcript of discussion)
    Paulson, L
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 126 - 133
  • [49] One-Way Cryptography (Transcript of Discussion)
    Blaze, Matt
    [J]. SECURITY PROTOCOLS XIX, 2011, 7114 : 341 - 358
  • [50] End to End Security is Not Enough (Transcript of Discussion)
    Clarke, Dylan
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 268 - 277