Smyth

Results: 489



#Item
51

Automatic verification of privacy properties in the applied pi calculus? St´ephanie Delaune, Mark Ryan, and Ben Smyth Abstract We develop a formal method verification technique for cryptographic protocols. We focus on p

Add to Reading List

Source URL: bensmyth.com

Language: English - Date: 2012-05-24 07:24:42
    52

    Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya Susan P. Wyche, Thomas N. Smyth, Marshini Chetty, Paul M. Aoki*, and Rebecca E. Grinter GVU Center *Intel Labs Berkeley

    Add to Reading List

    Source URL: www.paulaoki.com

    Language: English - Date: 2010-01-10 22:27:50
      53

      Distortion as a Validation Criterion in the Identification of Suspicious Reviews Guangyu Wu, Derek Greene, Barry Smyth, Pádraig Cunningham School of Computer Science and Informatics University College Dublin, Ireland

      Add to Reading List

      Source URL: snap.stanford.edu

      Language: English - Date: 2010-07-07 22:21:57
        54

        Trauma-Informed Care Nancy J. Smyth, PhD, LCSW Professor & Dean University at Buffalo School of Social Work P² Collaborative, December 12, 2014

        Add to Reading List

        Source URL: www.p2wny.org

        Language: English - Date: 2014-12-16 14:44:50
          55

          Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators Ben Smyth Mark Ryan

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          Language: English - Date: 2010-03-26 11:16:11
            56

            Paving the way for electoral reform Ben Smyth and Mark Ryan Formal Verification and Security Group, School of Computer Science, University of Birmingham May 19, 2010

            Add to Reading List

            Source URL: www.bensmyth.com

            Language: English - Date: 2012-09-26 05:08:01
              57

              FORMAL VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS WITH AUTOMATED REASONING by BEN SMYTH

              Add to Reading List

              Source URL: www.bensmyth.com

              Language: English - Date: 2012-05-24 07:24:41
                58

                ProVerif 1.91: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial Bruno Blanchet, Ben Smyth, and Vincent Cheval , , September 9, 2015

                Add to Reading List

                Source URL: bensmyth.com

                Language: English - Date: 2015-09-10 05:06:51
                  59

                  Incentives are used in survey research to increase response rates and provide responders with some small compensation for their time (Dillman, Smyth, & Melani Christian, They work the same to encourage students ta

                  Add to Reading List

                  Source URL: ir.boisestate.edu

                  Language: English - Date: 2015-09-14 16:03:17
                    60

                    Sample (2 Page Condensed Report) PowerDown Audit – Procedures, Recommendations & House Statistics Report Client: Jackie & John Smyth Date: July 12, 2010

                    Add to Reading List

                    Source URL: www.pouneh.com

                    Language: English - Date: 2014-06-20 12:56:15
                      UPDATE