Protocols

Results: 23793



#Item
61Cryptocurrencies / Computing / Blockchains / Cryptography / Concurrent computing / Alternative currencies / Cross-platform software / Ethereum / Secure multi-party computation / Byzantine fault tolerance / Peer-to-peer / Smart contract

Incentives in Security Protocols Sarah Azouvi, Alexander Hicks, and Steven J. Murdoch University College London {sarah.azouvi.13,alexander.hicks,s.murdoch}@ucl.ac.uk Abstract. Real world protocols often involve human ch

Add to Reading List

Source URL: alexanderlhicks.com

Language: English - Date: 2018-06-18 10:21:30
62

Can Johnny build  a protocol?   Co­ordinating developer  and user intentions for privacy­enhanced secure  messaging protocols

Add to Reading List

Source URL: nextleap.eu

Language: English - Date: 2018-06-25 05:11:58
    63

    TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication Ralph Holz∗ , Johanna Amann‡ , Olivier Mehani† , Matthias Wachs§ , Mohamed Ali Kaafar† ∗ University of Sydney, Au

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2017-10-16 19:29:52
      64

      GATEWAY 96 well reactionsBefore attempting these protocols refer to COSHH procedure and chemical assessments) 3 way Gateway reactions Clonase mix Clonase LRII

      Add to Reading List

      Source URL: www.eummcr.org

      Language: English - Date: 2018-02-20 12:08:50
        65

        page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

        Add to Reading List

        Source URL: www.chaum.com

        Language: English - Date: 2017-08-15 16:01:14
          66

          Pathways & Protocols A filmmaker’s guide to working with Indigenous people, culture and concepts Terri Janke Contents

          Add to Reading List

          Source URL: www.screenaustralia.gov.au

          Language: English - Date: 2016-02-14 03:48:39
            67

            Covert channels detection in protocols using scenarios Loïc Hélouët1 , Claude Jard2 , Marc Zeitoun3 Irisa/INRIA, Campus de Beaulieu, FRennes, France Irisa/ENS Cachan-Bretagne, Campus de Ker-Lann,FBruz, F

            Add to Reading List

            Source URL: gray-world.net

            Language: English - Date: 2010-06-12 03:14:41
              68

              Developing Security Protocols by Refinement Christoph Sprenger David Basin Dept. of Computer Science

              Add to Reading List

              Source URL: people.inf.ethz.ch

              Language: English - Date: 2014-04-16 16:25:47
                69

                Verifying Properties of Electronic Voting Protocols ∗ St´ephanie Delaune LSV, France T´el´ecom R&D ENS Cachan, CNRS, France

                Add to Reading List

                Source URL: www.cs.bham.ac.uk.

                Language: English - Date: 2009-02-25 10:33:24
                  UPDATE