Protocol analysis
Results: 1021
# | Item |
---|---|
21![]() | Analysis of the Blockchain Protocol in Asynchronous Networks Rafael Pass∗ Cornell Tech Lior SeemanAdd to Reading ListSource URL: eprint.iacr.org- Date: 2016-05-09 21:22:18 |
22![]() | Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2Add to Reading ListSource URL: theory.stanford.edu- Date: 2010-03-09 22:02:41 |
23![]() | Protocol Analysis 2.0 How to detect malware which deletes all my Dropbox data? MotivationAdd to Reading ListSource URL: www.iaik.tugraz.at- Date: 2015-12-01 06:00:06 |
24![]() | PRISMA-P (Preferred Reporting Items for Systematic review and Meta-Analysis Protocolschecklist: recommended items to address in a systematic review protocol* Section and topic Item No Checklist item ADMINISTRATIVEAdd to Reading ListSource URL: www.prisma-statement.org- Date: 2016-01-07 14:14:41 |
25![]() |