Search results for: Colin Boyd
Thyroid Research > 2017 > 10 > 1 > 1-4
Lecture Notes in Computer Science > Information and Communications Security > Security Protocol I > 147-159
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Cryptographic Protocols > 17-32
Lecture Notes in Computer Science > Information and Communications Security > Cryptographic Protocols > 84-96
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Information and Communication Security > Digital Signatures > 119-134
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptographic Algorithms > 494-508
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Digital Signatures > 218-235
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Authenticated Key Exchange > 248-262
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Exchange > 53-70