Protocol analysis

Results: 1021



#Item
141An Architecture for High Performance Network Analysis  Fulvio Risso and Loris Degioanni Dipartimento di Automatica e Informatica – Politecnico di Torino Corso Duca degli Abruzzi, 24 – 10129 Torino, Italy {risso,degio

An Architecture for High Performance Network Analysis Fulvio Risso and Loris Degioanni Dipartimento di Automatica e Informatica – Politecnico di Torino Corso Duca degli Abruzzi, 24 – 10129 Torino, Italy {risso,degio

Add to Reading List

Source URL: www.winpcap.org

Language: English - Date: 2010-09-05 10:10:56
142Volume 7, No. 7 JanuaryANNEX VII CONTRIBUTING TO THE KYOTO PROTOCOL Is Kyoto Fatally Flawed? - An Analysis with MacGEM

Volume 7, No. 7 JanuaryANNEX VII CONTRIBUTING TO THE KYOTO PROTOCOL Is Kyoto Fatally Flawed? - An Analysis with MacGEM

Add to Reading List

Source URL: www.etsap.org

Language: English - Date: 2002-11-29 00:05:38
    143Cost Benefit Analysis of the FCTC Protocol on Illicit Trade in Tobacco Products A Report Prepared for ASH by Paul Johnson

    Cost Benefit Analysis of the FCTC Protocol on Illicit Trade in Tobacco Products A Report Prepared for ASH by Paul Johnson

    Add to Reading List

    Source URL: www.ash.org.uk

    - Date: 2012-12-05 04:45:07
      144BRICS  Basic Research in Computer Science BRICS RSHavelund et al.: Formal Modeling and Analysis of an Audio/Video Protocol  Formal Modeling and Analysis of

      BRICS Basic Research in Computer Science BRICS RSHavelund et al.: Formal Modeling and Analysis of an Audio/Video Protocol Formal Modeling and Analysis of

      Add to Reading List

      Source URL: www.brics.dk

      - Date: 1997-12-01 08:28:07
        145Supplementary Protocol for DNA Nanoswitches: A quantitative platform for gel-based biomolecular interaction analysis, MA Koussa, K Halvorsen, A Ward, WP Wong, Nature MethodsPreface: This document serves as a det

        Supplementary Protocol for DNA Nanoswitches: A quantitative platform for gel-based biomolecular interaction analysis, MA Koussa, K Halvorsen, A Ward, WP Wong, Nature MethodsPreface: This document serves as a det

        Add to Reading List

        Source URL: wonglab.tch.harvard.edu

        Language: English - Date: 2014-12-08 13:01:48
          146Protocol Systematic review and meta-analysis of the efficacy of mesenchymal stem cells in animal models of traumatic brain injury Background Traumatic brain injury (TBI) is the leading cause of long-term disability in

          Protocol Systematic review and meta-analysis of the efficacy of mesenchymal stem cells in animal models of traumatic brain injury Background Traumatic brain injury (TBI) is the leading cause of long-term disability in

          Add to Reading List

          Source URL: www.dcn.ed.ac.uk

          Language: English - Date: 2014-11-24 05:55:18
            147ENERGY TECHNOLOGY SYSTEMS ANALYSIS PROGRAMME  CONTRIBUTING TO THE KYOTO PROTOCOL Coherent, Comparative Assessments to serve the initial Implementation of the Kyoto Protocol and beyond Annex 7

            ENERGY TECHNOLOGY SYSTEMS ANALYSIS PROGRAMME CONTRIBUTING TO THE KYOTO PROTOCOL Coherent, Comparative Assessments to serve the initial Implementation of the Kyoto Protocol and beyond Annex 7

            Add to Reading List

            Source URL: iea-etsap.org

            Language: English - Date: 2010-11-09 05:32:13
              148Assignment 3: Protocol Design and Analysis 1 Problem  You are to write a design document for a “secure” multiparty chat protocol.

              Assignment 3: Protocol Design and Analysis 1 Problem You are to write a design document for a “secure” multiparty chat protocol.

              Add to Reading List

              Source URL: grothoff.org

              Language: English - Date: 2011-06-21 07:45:43
                149INTERNATIONAL ENERGY AGENCY ENERGY TECHNOLOGY SYSTEMS ANALYSIS PROGRAMME CONTRIBUTING TO THE KYOTO PROTOCOL SUMMARY OF ANNEX VII)

                INTERNATIONAL ENERGY AGENCY ENERGY TECHNOLOGY SYSTEMS ANALYSIS PROGRAMME CONTRIBUTING TO THE KYOTO PROTOCOL SUMMARY OF ANNEX VII)

                Add to Reading List

                Source URL: www.iea-etsap.org

                Language: English - Date: 2010-11-09 07:09:17
                  150A few remarks on:  Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing M.Kim, N.Park, D.Won The authors of [2] misunderstood some important aspects of our paper

                  A few remarks on: Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing M.Kim, N.Park, D.Won The authors of [2] misunderstood some important aspects of our paper

                  Add to Reading List

                  Source URL: ruxandraolimid.weebly.com

                  Language: English - Date: 2014-03-02 09:19:38