Amanote Research

Amanote Research

    RegisterSign In

Cryptographic Protocol Explication and End-Point Projection

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-540-88313-5_34
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2008

Authors
Jay McCarthyShriram Krishnamurthi
Publisher

Springer Berlin Heidelberg


Related search

Survey on End-To-End Verifiable Cryptographic Voting Systems

International Journal of Computer Applications
2014English

What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis

2003English

Point-To-Point Protocol (PPP) Vendor Protocol

2004English

P2P Reputation Management Scheme Using a Cryptographic Protocol

IOSR Journal of Engineering
2012English

Point-To-Point Protocol (PPP) Bridging Control Protocol (BCP)

2003English

Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

One Implementation of a Protocol for Generation and Distribution of Cryptographic Keys

2018English

High Dimensional Change Point Estimation via Sparse Projection

Journal of the Royal Statistical Society. Series B: Statistical Methodology
UncertaintyStatisticsProbability
2017English

Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing

2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy