Cached

Download Links

by Comp Week (s , Ihor Kuz , Felix Rauch , Manuel M. T. Chakravarty , Gernot Heiser

Active Bibliography

Authentication in Distributed System – n.n.
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
3 Reconfigurable Computing For Symmetric-Key Algorithms – Adam J. Elbirt - 2002
Data Security - CM 0321 – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 2001
8 Answers To Frequently Asked Questions About Today's Cryptography – Paul Fahn - 1993
MODULE: Data Security – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 1996
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
1 Disconnected Operation in the Pesto Storage System – Feike W. Dillema - 2005
40 Security Protocols and their Properties – Martín Abadi - 2000
9 A Set of Protocols for Micropayments in Distributed Systems (Extended Abstract) – Lei Tang - 1995
12 SNP: An Interface for Secure Network Programming – Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su, Simon S. Lam - 1994
2 Secure Multicast Communications using a key Distribution Center – Francisco Jordan, Manuel Medina - 1994
8 A Calculus for Security Bootstrapping in Distributed Systems – Ueli M Maurer, Pierre E Schmid - 1996
1 A Complete Secure Transport Service in the Internet – Francisco Jordan, Manuel Medina - 1993
5 A Calculus for Secure Channel Establishment in Open Networks – Ueli Maurer, Pierre E. Schmid - 1994
Introduction to Foundations of Security Protocols – R. Ramanujam, S. P. Suresh
Number 780 Computer Laboratory Cryptography and evidence – Michael Roe, Cambridge Cb Fd, George A. Lear - 2010
14 Cryptography and Evidence – Michael Roe, George A. Lear - 1997