Home Advanced Search

Advanced Search - Page 1

Protocols for Authentication and Key Establishment
  • PDF
  • English
  • Year: 2003
  • Author: Colin Boyd, Anish Mathuria (auth.)
Protocols for authentication and key establishment
  • PDF
  • English
  • Year: 2011
  • Author: Boyd, Colin;Mathuria, Anish
Protocols for Authentication and Key Establishment
  • PDF
  • English
  • Year: 2008
  • Author: Colin Boyd, Anish Mathuria
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
  • PDF
  • English
  • Year: 2011
  • Author: Sriram K. Rajamani (auth.), Somesh Jha, Anish Mathuria (eds.)
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
  • PDF
  • English
  • Year: 2013
  • Author: Chris J. Mitchell (auth.), Colin Boyd, Leonie Simpson (eds.)
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003. Proceedings
  • PDF
  • English
  • Year: 2003
  • Author: Paul C. van Oorschot (auth.), Colin Boyd, Wenbo Mao (eds.)
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
  • PDF
  • English
  • Year: 2009
  • Author: Basie von Solms (auth.), Colin Boyd, Juan González Nieto (eds.)
Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings
  • PDF
  • English
  • Year: 2005
  • Author: Bob Blakley, G. R. Blakley (auth.), Colin Boyd, Juan Manuel González Nieto (eds.)
Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings
  • PDF
  • English
  • Year: 2005
  • Author: Bob Blakley, G. R. Blakley (auth.), Colin Boyd, Juan Manuel González Nieto (eds.)