Protocol analysis

Results: 1021



#Item
111Unpicking PLAID A Cryptographic Analysis of an ISO-standardstrack Authentication Protocol SSR 2014, RHUL, United Kingdom Jean Paul Degabriele Kenneth G. Paterson

Unpicking PLAID A Cryptographic Analysis of an ISO-standardstrack Authentication Protocol SSR 2014, RHUL, United Kingdom Jean Paul Degabriele Kenneth G. Paterson

Add to Reading List

Source URL: ssr2015.com

Language: English - Date: 2015-06-22 06:35:00
    112Analysis of an Electronic Voting Protocol in the Applied Pi Calculus Steve Kremer1 and Mark Ryan2 1  Laboratoire Sp´ecification et V´erification

    Analysis of an Electronic Voting Protocol in the Applied Pi Calculus Steve Kremer1 and Mark Ryan2 1 Laboratoire Sp´ecification et V´erification

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2009-02-25 10:33:24
      113Combining Theory Generation and Model Checking for Security Protocol Analysis Nicholas J. Hopper Sanjit A. Seshia January 2000

      Combining Theory Generation and Model Checking for Security Protocol Analysis Nicholas J. Hopper Sanjit A. Seshia January 2000

      Add to Reading List

      Source URL: reports-archive.adm.cs.cmu.edu

      Language: English - Date: 2000-02-21 17:21:30
        114POLICY/ PROCEDURE/PROTOCOL Title: Clinical Research Coverage Analysis Policy  Policy # ADM.41

        POLICY/ PROCEDURE/PROTOCOL Title: Clinical Research Coverage Analysis Policy Policy # ADM.41

        Add to Reading List

        Source URL: www.research.buffalo.edu

        Language: English - Date: 2015-02-16 16:11:21
          115FINAL REPORTCookie Analysis

          FINAL REPORTCookie Analysis

          Add to Reading List

          Source URL: fbcdn-dragon-a.akamaihd.net

          Language: English - Date: 2013-07-09 14:28:00
          116Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

          Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

          Add to Reading List

          Source URL: www1.icsi.berkeley.edu

          Language: English - Date: 2012-09-26 16:43:02
          117Common Assignment Study  Student Work Analysis Protocol For Unit and Assignment Revision (Approximately 2 hours and 35 minutes) Homework

          Common Assignment Study Student Work Analysis Protocol For Unit and Assignment Revision (Approximately 2 hours and 35 minutes) Homework

          Add to Reading List

          Source URL: collegeready.gatesfoundation.org

          Language: English
            118Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

            Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

            Add to Reading List

            Source URL: seclab.stanford.edu

            Language: English - Date: 2010-07-20 20:53:54