1![Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross](https://www.pdfsearch.io/img/932d4cfa713caf2e99d914dfbdb02c0c.jpg) | Add to Reading ListSource URL: storage.googleapis.comLanguage: English - Date: 2018-04-02 02:01:50
|
---|
2![A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London , A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,](https://www.pdfsearch.io/img/336076e9c4c149ad0167e380e4b417c7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2018-01-18 13:44:36
|
---|
3![Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen, Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen,](https://www.pdfsearch.io/img/f1a1b0501da3806a28107d818249d915.jpg) | Add to Reading ListSource URL: jonmillen.comLanguage: English - Date: 2017-01-20 09:49:12
|
---|
4![Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc](https://www.pdfsearch.io/img/bfeee45da2b4ade9a0af49c1cca688ea.jpg) | Add to Reading ListSource URL: jeapostrophe.github.io- Date: 2018-04-03 12:30:31
|
---|
5![Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR](https://www.pdfsearch.io/img/8150d2e2f27cb47a09ceef63753be072.jpg) | Add to Reading ListSource URL: rich.recoil.orgLanguage: English - Date: 2006-04-19 14:01:38
|
---|
6![Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1 Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1](https://www.pdfsearch.io/img/1b094f7dc9a5955265000a93617dd458.jpg) | Add to Reading ListSource URL: work.debayangupta.comLanguage: English - Date: 2014-06-25 08:00:47
|
---|
7![Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5 Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5](https://www.pdfsearch.io/img/41ff2ba94e3586f08cec1f54ee37706b.jpg) | Add to Reading ListSource URL: systempay.cyberpluspaiement.comLanguage: English - Date: 2015-12-16 04:48:58
|
---|
8![Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1 Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1](https://www.pdfsearch.io/img/47a145ec55592a3344640afdcdddd99f.jpg) | Add to Reading ListSource URL: womencourage.acm.orgLanguage: English - Date: 2016-08-09 09:13:43
|
---|
9![Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk](https://www.pdfsearch.io/img/4b305e1aa3c292b2c758c49b6d6ccfbd.jpg) | Add to Reading ListSource URL: cs-www.cs.yale.eduLanguage: English - Date: 2006-09-25 10:55:42
|
---|
10![Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement: Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:](https://www.pdfsearch.io/img/d2ee35e22c52960b64744667f62784ed.jpg) | Add to Reading ListSource URL: www.thorprojects.comLanguage: English - Date: 2015-07-23 13:05:22
|
---|