XTR

Results: 836



#Item
71

Shimano’s Official Di2 XTR Launch - Pinkbike

Add to Reading List

Source URL: www.pivotcycles.com

Language: English - Date: 2015-08-22 23:48:14
    72Operations research / Mathematical optimization / Numerical analysis / Mathematics / NP-complete problems / Vehicle routing problem / Dynamic programming / Column generation / Optimization problem / XTR / DantzigWolfe decomposition

    The Vehicle Routing Problem with Discrete Split Delivery and Time Windows Ilaria Vacca Matteo Salani STRC 2009

    Add to Reading List

    Source URL: www.strc.ch

    Language: English - Date: 2009-09-16 14:54:48
    73Algebra / Mathematics / Abstract algebra / Computer algebra / Polynomials / Finite fields / Algebraic geometry / Algebraic topology / Algebraic curve / CW complex / Grbner basis / XTR

    D:/PaperSVN/Papers/Surface_analysis/p.dvi

    Add to Reading List

    Source URL: people.mpi-inf.mpg.de

    Language: English - Date: 2009-02-02 04:17:09
    74Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / Digital signature / XTR / Cryptographic protocol / Challengeresponse authentication / Security protocol notation / NeumanStubblebine protocol

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:44
    75Message authentication codes / Public-key cryptography / Public key infrastructure / RSA / BurrowsAbadiNeedham logic / XTR

    Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:41:03
    76Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    77Public-key cryptography / Public key infrastructure / XTR / BurrowsAbadiNeedham logic / Four-square cipher / OkamotoUchiyama cryptosystem

    PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:39:38
    78Cryptography / Public-key cryptography / Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic nonce / XTR / Digital signature / Subtyping / Security protocol notation

    Types and Effects for Asymmetric Cryptographic Protocols Andrew D. Gordon Microsoft Research Cambridge, UK Alan Jeffrey

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:36:15
    79Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles

    PDF Document

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:13
    80Cryptography / Public-key cryptography / Notary / E-commerce / XTR / RSA / Digital signature / Zero-knowledge proof / Blacklist / Proof of knowledge / DiffieHellman key exchange / Internet Relay Chat

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2010-08-16 11:41:06
    UPDATE