Ad Hoc Networks / T ime Ag / Needham / I. Cervesato N. A. / T ime@T SA / IEEE Journal / All About / SRI International / /
Country
United States / / /
Event
FDA Phase / Person Communication and Meetings / /
Facility
University of Rijeka / Federal University of Para´ıba / K pub / B pub / A}K pub / University of Pennsylvania / University of London / mik@dcs.qmul.ac.uk University College / /
University College London / National Science Foundation / University of Pennsylvania / University of Rijeka / Federal University of Para´ıba / National Research University Higher School of Economics / University of London / /
Person
Bob deT / J. A. Malcolm / V / Max Kanovich / Ban Kirigin / Ai / T. B. Kirigin / V / Bob Alice Bob / Carolyn Talcott / Andre Scedrov / Alice / B NA / Vivek Nigam / Sergei O. Kuznetsov / Mary / / /
Position
editor / Queen / guard / timed model for cyber-physical security protocols / automated assistant for clinical investigations / intruder model / automated assistant / /
Product
T10 / A2 / S1 / t0 / /
ProvinceOrState
New Brunswick / Tennessee / /
PublishedMedium
Journal of Systems and Software / Cryptology ePrint Archive / IEEE Transactions on Information Theory / Lecture Notes in Computer Science / /
Technology
above protocol / distance bounding protocols / ultrasound / supreme technology / security protocols / cyber-physical security protocols / cyberphysical security protocols / encryption / communication technologies / Bounded memory protocols / public key / cyber-physical protocols / bounded security protocols / protocols cyber-physical security protocols / symmetric and asymmetric encryption / model public key encryption / distance-bounding protocols / radio frequency / public key protocols / distance bounding protocol / timed NeedhamSchroeder protocol / /