Protocols

Results: 23793



#Item
161

SMAPs: Short Message Authentication Protocols Khaled Baqer1 , Johann Bezuidenhoudt2 , Ross Anderson1 , and Markus Kuhn1 1 Computer Laboratory, University of Cambridge, Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2017-08-27 10:50:50
    162

    MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols Caroline Trippel Daniel Lustig* Margaret Martonosi Princeton University *NVIDIA

    Add to Reading List

    Source URL: arxiv.org

    - Date: 2018-02-12 20:23:01
      163

      Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin Steven Goldfeder1 , Joseph Bonneau2 , Rosario Gennaro3 , and Arvind Narayanan1 1

      Add to Reading List

      Source URL: fc17.ifca.ai

      - Date: 2017-03-17 12:04:12
        164

        General Health & Safety Protocols Adult & School Based Kilimanjaro Trips Table of Content

        Add to Reading List

        Source URL: www.kilimanjaroachievers.com

        - Date: 2016-04-12 15:48:19
          165

          Enterprise Adoption Best Practices Integrating FIDO & Federation Protocols December 2017 Copyright © FIDO Alliance All Rights Reserved.

          Add to Reading List

          Source URL: fidoalliance.org

          - Date: 2017-12-13 14:35:48
            166

            H2020-ICT-2014 – ProjectECRYPT – CSA ECRYPT – Coordination & Support Action D5.2 Algorithms, Key Size and Protocols Report

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            - Date: 2016-10-22 12:38:28
              167

              Inclusive Block Chain Protocols Yoad Lewenberg1 , Yonatan Sompolinsky1 , and Aviv Zohar1,2 1 The School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel

              Add to Reading List

              Source URL: www.cs.huji.ac.il

              - Date: 2015-03-26 17:28:14
                168

                From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back∗ Benny Applebaum† Pavel Raykov†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-07-13 03:18:58
                  169

                  ARSDK Protocols Parrot SA November 4, 2015 2

                  Add to Reading List

                  Source URL: developer.parrot.com

                  - Date: 2016-05-18 09:34:59
                    170

                    Private Land Closure Information Check land closure information before attempting to access private property. Always communicate with landowners if you have questions regarding access protocols. This is voluntary compil

                    Add to Reading List

                    Source URL: www.ofic.com

                    - Date: 2017-08-02 18:26:49
                      UPDATE