1![On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany](https://www.pdfsearch.io/img/ab23f688c097104255580708edc32f3b.jpg) | Add to Reading ListSource URL: www.volkerroth.comLanguage: English - Date: 2007-11-23 00:00:17
|
---|
2![Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth](https://www.pdfsearch.io/img/e7245fc6bf3bfc45418ff4f0e0fb892d.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.uk.Language: English - Date: 2010-03-26 06:44:57
|
---|
3![Secure Cryptographic Protocols for E-commerce Transaction on the Internet Secure Cryptographic Protocols for E-commerce Transaction on the Internet](https://www.pdfsearch.io/img/ec3735bfe992166c9e01a722bac51989.jpg) | Add to Reading ListSource URL: www.sgs.cityu.edu.hkLanguage: English - Date: 2004-01-08 09:10:43
|
---|
4![Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp](https://www.pdfsearch.io/img/4471b43c04a95227f1c78626e3a4cba9.jpg) | Add to Reading ListSource URL: www-kb.is.s.u-tokyo.ac.jpLanguage: English - Date: 2008-12-22 04:20:35
|
---|
5![Cryptographic schemes Protocols Specifications of primitives Cryptographic schemes Protocols Specifications of primitives](https://www.pdfsearch.io/img/0fdc8ab7b7e925edd7dd7f1665301a00.jpg) | Add to Reading ListSource URL: prosecco.gforge.inria.frLanguage: English - Date: 2014-11-25 03:59:23
|
---|
6![Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley](https://www.pdfsearch.io/img/05af707322685f50a2c91a1d68460fa3.jpg) | Add to Reading ListSource URL: www.chriskarlof.comLanguage: English - Date: 2012-01-02 15:39:33
|
---|
7![Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc](https://www.pdfsearch.io/img/bfeee45da2b4ade9a0af49c1cca688ea.jpg) | Add to Reading ListSource URL: jeapostrophe.github.io- Date: 2018-04-03 12:30:31
|
---|
8![Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University](https://www.pdfsearch.io/img/6f2811f4dc1c68ba2903026b2be2252f.jpg) | Add to Reading ListSource URL: jeapostrophe.github.io- Date: 2018-04-03 12:30:31
|
---|
9![Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory Pembroke Street, Cambridge, England CB2 3QG Abstract. Cryptographic protocols are used in distributed systems to](https://www.pdfsearch.io/img/a665fa126ab6930c44bb81c614958c93.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.uk- Date: 2006-07-26 10:17:27
|
---|
10![Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡ Probabilistic Termination and Composability of Cryptographic Protocols∗ Ran Cohen† Sandro Coretti‡](https://www.pdfsearch.io/img/153326906f610c2671fa3ae741cb27e8.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-07-21 09:17:49
|
---|