Search results for: J. Mitchell
Lecture Notes in Computer Science > Software Security — Theories and Systems > Multiset Rewriting for Protocol Analysis > 356-383
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 149-154
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptographic Protocols > 192-197
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Message Authentication > 184-196
IFIP — The International Federation for Information Processing > Information Security Management, Education and Privacy > I-NetSec4 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems > 183-199
Lecture Notes in Computer Science > Information and Communications Security > Key Management > 304-314
Lecture Notes in Computer Science > Security Protocols > 171-176
Lecture Notes in Computer Science > Applications of Evolutionary Computing > EvoMUSART Contributions > 533-538
Lecture Notes in Computer Science > Human-Computer Interaction. Users and Applications > HCI in Complex Environments > 394-402