Xxxx and X Sample Clauses

Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange, in: Advances in Cryp- tology – Crypto’03, LNCS 2729, pp. 110–125, 2003.
AutoNDA by SimpleDocs
Xxxx and X. X. Xxxxx. 1997. The range, distribution, and habitat of Sceloporus arenicolus in New Mexico. Final report to New Mexico Department of Game and Fish. Contract #80-516.6-01. 31 pp. Xxxxxxxx, X.X. 1995. Wild animals and settlers on the Great Plains. Univ. of Oklahoma Press, Norman. 316 pp. Xxxxx, X.X. 2002. Landscape features associated with greater prairie-chicken lek locations in Kansas. M. S. Thesis, Emporia State University, Emporia, Kansas. Fuhlendorf, S.D., A.J.W. Xxxxxxxx, X.X. Xxxxxx Xx., and X.X. Xxxxxxxxx. 2002. Multi-scale effects of habitat loss and fragmentation on lesser prairie-chicken populations of the US Southern Great Plains. Lands. Ecol. 17:617-628. Xxxxxx, X.X. 1994a. Movements and nesting habitat of lesser prairie-chicken hens in Colorado. Southwestern Nat. Vol. 39.
Xxxx and X. Xxxxxx, ‘New Approaches to the Accountability of International Organizations’, (2019) 16 International Organizations Law Review 1, at 10, having noted, for example, that ‘a new chapter in the conversation about accountability’ was recently opened following allegations of widespread sexual abuse by UN peacekeepers. Ibid., at 3.
Xxxx and X. Xxxxxx, Transaction Processing: Concepts and Techniques, Xxxxxx- Xxxxxxxx, August 1992.
Xxxx and X. X. Xxxx. Modeling insider attacks on group key-exchange protocols. In X. Xxxxxx, X. Xxxxxxx, and X. Xxxxx, editors, ACM CCS 05, pages 180 189. ACM Press, Nov. 2005.
Xxxx and X. X. Tsai, “A manet based emergency communication and information sys- tem for catastrophic natural disasters,” in Proc. of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS’09),Montreal, Quebec, Canada. IEEE, June 2009, pp. 412–417. [8] X. Xxxxxx and X. Xxxxxx, “Public safety and emergency case communications: Opportunities from the aspect of cognitive radio,” in Proc. of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN’08),Chicago, Illinois, USA. IEEE, October 2008, pp. 1–10. [9] X. X. Xxx, X. Xxx, and X. X. Xxx, “Distributed collaborative key agreement and authentication protocols for dynamic peer groups,” IEEE/ACM Transactions on Networking, vol. 14, no. 2, pp. 263–276, April 2006. [10] X. Xxx, X. Xxxxxx, and X. Xxxxxx, “Simple and fault-tolerant key agreement for dynamic collaborative groups,” in Proc. of the 7th ACM conference on Computer and communications security (CCS’00), Athens, Greece. ACM, November 2000, pp. 235–244. [11] X. Xxxxxxxxxx and X. Xxxx, “Ternary tree based group key agreement for cognitive radio manets,” Interna- tional Journal of Computer Network and Information Security (IJCNIS), vol. 6, no. 10, pp. 24–31, September 2014. [12] X. Xxxxxxx, X. Xxxxxx, and X. Xxxxxxx, “Xxxxxx-xxxxxxx key distribution extended to group communication,” in Proc. of the 3rd ACM conference on Computer and communications security (CCS’96), New Delhi, India. ACM, March 1996, pp. 31–37. [13] X. Xxxx and X. Xxx, “Efficient group diffie–xxxxxxx key agreement protocols,” Computers & Electrical En- gineering, vol. 40, no. 6, pp. 1972–1980, August 2014. [14] X. Xxxxx, X. X. Xxx, and X. Xxxxxxx, “An efficient ecc-based privacy-preserving client authentication pro- tocol with key agreement using smart card,” Journal of Information Security and Applications, vol. 21, pp. 1–19, April 2015. [15] H.-X. Xxx, B.-Z. He, C.-X. Xxxx, X.-X. Wu, C.-X. Xxx, and X. Xxxx, “A provable authenticated group key agreement protocol for mobile environment,” Information Sciences, vol. 321, pp. 224–237, November 2015. [16] X. Xxxx, X. Xx, X. Xxx, X. Xxxxx, X. Xxxx, and X. Xxxx, “Provably secure group key management approach based upon hyper-sphere,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 12, pp. 3253– 3263, January 2014. [17] X.-X. Jung, X.-X. Lee, and X.-X. Chung, “The effective group key agreement protocol for ad-hoc networks for medical emergency environments,” in Proc. of the 2006 SI...
Xxxx and X. Mathuria. Proto ols for Authenti ation and Key Establishment. Springer-Verlag, 2003. [BN03℄ X. Xxxx and J.M.G. Nieto. Round-optimal ontributory onferen e key agree- ment. In Publi Key Cryptography '03, pages 161 174. LNCS 2567, 2003. [BW98℄ K. Be ker and X. Xxxxx. Communi ation omplexity of group key distribution. In Pro eedings of 5th ACM Conferen e on Computer and Communi ations Se- urity, pages 1 6. ACM Press, 1998.
AutoNDA by SimpleDocs
Xxxx and X. Xxxx. S alable proto ols for authenti ated group key ex hange - full version. In Advan es in Cryptology - CRYPTO '03, pages 110 125. LNCS 2729, 2003.
Xxxx and X. Xxxxxx. Protocol failures related to order of encryption and signature: Computation of discrete logarithms in RSA groups, April 1997. (Draft).
Xxxx and X. Xxxxxxxx, \Distributed Computer Systems: Four Case Studies," Proc. of the IEEE, Vol. 75, No. 5, May 1987.
Time is Money Join Law Insider Premium to draft better contracts faster.