Showing 1 - 20 results of 134 for search 'Cremers, T', query time: 0.03s
Refine Results
-
1
Electronic communication in heterometallated porphyrin oligomers by Cremers, J
Published 2017Thesis -
2
Unbounded verification, falsification, and characterization of security protocols by pattern refinement by Cremers, C
Published 2008Journal article -
3
The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper by Cremers, C
Published 2008Book section -
4
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol by Cremers, C
Published 2011Journal article -
5
-
6
-
7
Improving the ISO/IEC 11770 standard for key management techniques by Cremers, C, Horvat, M
Published 2014Conference item -
8
Improving the ISO/IEC 11770 standard for key management techniques by Cremers, C, Horvat, M
Published 2015Conference item -
9
Strengthening the security of authenticated key exchange against bad randomness by Feltz, M, Cremers, C
Published 2017Journal article -
10
Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal by Cremers, C, Feltz, M
Published 2013Journal article -
11
Improving the ISO/IEC 11770 standard for key management techniques by Cremers, C, Horvat, M
Published 2015Journal article -
12
SCP: SCENE COMPLETION PRE-TRAINING FOR 3D OBJECT DETECTION by Y. Shan, Y. Xia, Y. Xia, Y. Chen, D. Cremers, D. Cremers
Published 2023-12-01
Article -
13
Editorial: Conversational AI by Stephan Raaijmakers, Stephan Raaijmakers, Anita Cremers, Anita Cremers, Emiel Krahmer, Matthijs Westera
Published 2023-05-01
Article -
14
Component-based formal analysis of 5G-AKA: channel assumptions and session confusion by Cremers, C, Dehnel-Wild, M
Published 2019Conference item -
15
Provably repairing the ISO/IEC 9798 standard for entity authentication by Basin, D, Cremers, C, Meier, S
Published 2013Journal article -
16
Efficient construction of machine-checked symbolic protocol security proofs. by Meier, S, Cremers, C, Basin, D
Published 2013Journal article -
17
-
18
Actor Key Compromise: Consequences and Countermeasures by Basin, D, Cremers, C, Horvat, M
Published 2015Conference item -
19
When the crypto in cryptocurrencies breaks: Bitcoin security under broken primitives by Giechaskiel, I, Cremers, C, Rasmussen, K
Published 2018Journal article -
20
Deduktive Datenbanken — Eine Einführung aus der Sicht der logischen Programmierung by Cremers, A, Griefahn, U, Hinze, R
Published 1994Book