Showing 1 - 20 results of 406 for search '"cryptographic protocol"', query time: 2.12s Refine Results
  1. 1
  2. 2
  3. 3
    by Mahlburg, Karl
    Published 2001
    Subjects: ...Cryptographic Protocols...
    Get full text
    Get full text
    Others
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
    ... protocols. In particular, we show that that all existing cryptographic protocols allow malicious players...
    Get full text
    Others
  9. 9
    by Patil, Akshay (Akshay R.)
    Published 2006
    ... composable (UC) secure framework to construct computationally sound proofs of cryptographic protocol security...
    Get full text
    Others
  10. 10
  11. 11
  12. 12
    by Lee, Ming-Feng
    Published 2013
    ... identity. This thesis formally studies and analyzes cryptographic protocols with anonymity preserving...
    Get full text
  13. 13
    by Skaff, Stephanie J. C.
    Published 2012
    ... correct functionality of cryptographic protocol verifiers. As a replacement for manual input of well...
    Get full text
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
    by Saul, Elton
    Published 2014
    ... is effective for creating cryptographic protocols since it encompasses a variety of design, analysis...
    Get full text
    Dissertation