Protocol analysis

Results: 1021



#Item
21Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass∗ Cornell Tech   Lior Seeman

Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass∗ Cornell Tech Lior Seeman

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-05-09 21:22:18
    22Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

    Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

    Add to Reading List

    Source URL: theory.stanford.edu

    - Date: 2010-03-09 22:02:41
      23Protocol Analysis 2.0  How to detect malware which deletes all my Dropbox data? Motivation

      Protocol Analysis 2.0 How to detect malware which deletes all my Dropbox data? Motivation

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      - Date: 2015-12-01 06:00:06
        24

        PRISMA-P (Preferred Reporting Items for Systematic review and Meta-Analysis Protocolschecklist: recommended items to address in a systematic review protocol* Section and topic Item No Checklist item ADMINISTRATIVE

        Add to Reading List

        Source URL: www.prisma-statement.org

        - Date: 2016-01-07 14:14:41
          25Ghostscript wrapper for Y:�ld�n.pdf

          Ghostscript wrapper for Y:ldn.pdf

          Add to Reading List

          Source URL: europa.informatik.uni-freiburg.de

          Language: English - Date: 2012-03-01 02:59:53
          26WB-Analysis of the Nakula & Antareja Incident A WB-Analysis of a system security-related incident 5.5th Bieleschweig Workshop Bielefeld, June

          WB-Analysis of the Nakula & Antareja Incident A WB-Analysis of a system security-related incident 5.5th Bieleschweig Workshop Bielefeld, June

          Add to Reading List

          Source URL: www.rvs.uni-bielefeld.de

          Language: English - Date: 2005-06-15 07:43:48
          27Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

          Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          28Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡  Martin J. Straussk

          Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

          Add to Reading List

          Source URL: cs-www.cs.yale.edu

          Language: English - Date: 2006-09-25 10:55:42
          29PRISMA-P (Preferred Reporting Items for Systematic review and Meta-Analysis Protocolschecklist: recommended items to address in a systematic review protocol* Section and topic Item No

          PRISMA-P (Preferred Reporting Items for Systematic review and Meta-Analysis Protocolschecklist: recommended items to address in a systematic review protocol* Section and topic Item No

          Add to Reading List

          Source URL: www.prisma-statement.org

          Language: English - Date: 2015-10-20 11:28:22
          30CUREE Publication No. W-02  Development of a Testing Protocol for Woodframe Structures Helmut Krawinkler Francisco Parisi

          CUREE Publication No. W-02 Development of a Testing Protocol for Woodframe Structures Helmut Krawinkler Francisco Parisi

          Add to Reading List

          Source URL: www.curee.org

          Language: English - Date: 2006-09-08 21:51:14