Protocols

Results: 23793



#Item
51On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

Add to Reading List

Source URL: www.volkerroth.com

Language: English - Date: 2007-11-23 00:00:17
    52Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

    Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2010-03-26 06:44:57
      53Immunization and Antibody Purification Protocols  CBG Introduction	
   This is intended as a brief guide to making rabbit polyclonal antibodies within the lab, not as a definitive work on

      Immunization and Antibody Purification Protocols CBG Introduction   This is intended as a brief guide to making rabbit polyclonal antibodies within the lab, not as a definitive work on

      Add to Reading List

      Source URL: hymanlab.mpi-cbg.de

      Language: English - Date: 2012-09-17 09:29:00
        54Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G

        Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G

        Add to Reading List

        Source URL: nds.rub.de

        Language: English - Date: 2015-10-30 05:21:14
          55Verification of Population Protocols Javier Esparza Technical University of Munich Joint work with Pierre Ganty, J´erˆome Leroux, Rupak Majumdar, and

          Verification of Population Protocols Javier Esparza Technical University of Munich Joint work with Pierre Ganty, J´erˆome Leroux, Rupak Majumdar, and

          Add to Reading List

          Source URL: www.lsv.fr

          Language: English - Date: 2017-05-22 04:51:19
            56International Journal of Advanced Networking & Applications (IJANA)  ISSN: A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey

            International Journal of Advanced Networking & Applications (IJANA) ISSN: A Scheduled Based MAC Protocols for Wireless Sensor Network: A Survey

            Add to Reading List

            Source URL: www.ijana.in

            Language: English - Date: 2016-07-11 03:04:47
              57Celartia Protocols  Hybridoma Cell culture with Petaka-HOT (High Oxygen Turnover, orange port) Production of Monoclonal Antibodies Petaka-HOT allows culturing non adherent

              Celartia Protocols Hybridoma Cell culture with Petaka-HOT (High Oxygen Turnover, orange port) Production of Monoclonal Antibodies Petaka-HOT allows culturing non adherent

              Add to Reading List

              Source URL: celartia.com

              Language: English - Date: 2017-08-21 20:25:10
                58Work the World with WSJT-X, Part 2: Codes, Modes, and Cooperative Software Development Here’s how the weak-signal digital protocols in WSJT-X work, and an overview of how their software is developed. Joe Taylor, K1JT,

                Work the World with WSJT-X, Part 2: Codes, Modes, and Cooperative Software Development Here’s how the weak-signal digital protocols in WSJT-X work, and an overview of how their software is developed. Joe Taylor, K1JT,

                Add to Reading List

                Source URL: www.physics.princeton.edu

                Language: English - Date: 2017-12-13 11:35:21
                  59A comparison of different TCP/IP and DTN protocols over the D-Star Digital Data mode John Ronan, EI7IG Cathal O’Connor

                  A comparison of different TCP/IP and DTN protocols over the D-Star Digital Data mode John Ronan, EI7IG Cathal O’Connor

                  Add to Reading List

                  Source URL: tapr.org

                  Language: English
                    60Verification of security protocols  from confidentiality to privacy

                    Verification of security protocols from confidentiality to privacy

                    Add to Reading List

                    Source URL: resources.mpi-inf.mpg.de

                    Language: English - Date: 2015-09-14 05:20:26