Xxxx and X Sample Clauses

Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange, in: Advances in Cryp- tology – Crypto’03, LNCS 2729, pp. 110–125, 2003.
AutoNDA by SimpleDocs
Xxxx and X. X. Xxxxx. 1997. The range, distribution, and habitat of Sceloporus arenicolus in New Mexico. Final report to New Mexico Department of Game and Fish. Contract #80-516.6-01. 31 pp. Xxxxxxxx, X.X. 1995. Wild animals and settlers on the Great Plains. Univ. of Oklahoma Press, Norman. 316 pp. Xxxxx, X.X. 2002. Landscape features associated with greater prairie-chicken lek locations in Kansas. M. S. Thesis, Emporia State University, Emporia, Kansas. Fuhlendorf, S.D., A.J.W. Xxxxxxxx, X.X. Xxxxxx Xx., and X.X. Xxxxxxxxx. 2002. Multi-scale effects of habitat loss and fragmentation on lesser prairie-chicken populations of the US Southern Great Plains. Lands. Ecol. 17:617-628. Xxxxxx, X.X. 1994a. Movements and nesting habitat of lesser prairie-chicken hens in Colorado. Southwestern Nat. Vol. 39.
Xxxx and X. Xxxxxx. 1957. “The Diffusion of an Innovation among Physicians”.
Xxxx and X. Xxxxxx, ‘New Approaches to the Accountability of International Organizations’, (2019) 16 International Organizations Law Review 1, at 10, having noted, for example, that ‘a new chapter in the conversation about accountability’ was recently opened following allegations of widespread sexual abuse by UN peacekeepers. Ibid., at 3.
Xxxx and X. Xxxxxx, Transaction Processing: Concepts and Techniques, Xxxxxx- Xxxxxxxx, August 1992.
Xxxx and X. X. Xxxx. Modeling insider attacks on group key-exchange protocols. In X. Xxxxxx, X. Xxxxxxx, and X. Xxxxx, editors, ACM CCS 05, pages 180 189. ACM Press, Nov. 2005.
Xxxx and X. Xxxxxxx, "A Trust Management Framework for Cloud Computing Platforms," 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 2017, pp. 1146-1153, xxxxx://xxx.xxx/10.1109/AINA.2017.108. [2] X. Xxxxxxxx, N. B. B. Xxxxx, X. Xxxx, and X. Xxxxxxxxx, "Adaptive and concurrent negotiation for an efficient cloud provisioning," International Journal of High Performance Computing and Networking, vol. 15, no. 3-4, pp. 145-157, 2020, xxxxx://xxx.xxx/10.1504/IJHPCN.2019.106088. [3] X. X. Xxxxxxxxxx, “Cloud Computing Security Challenges,” International Journal of Innovations in Engineering Research and Technology, vol. 7, no. 6, 2020. [4] X. Xxx, X. Xxxx, X. Xxx, X. Xxx, X. Xxxx and X. Xxxxx, "High Availability Evaluation Utilizing Service Level Agreement," 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017, pp. 841-844, xxxxx://xxx.xxx/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.129. [5] X. Xxxxxx, X. Xxx, X. Xxxx, X. Xxxx, and X. Xxx, "Online Optimization in Cloud Resource Provisioning: Predictions, Regrets, and Xxxxxxxxxx," Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 3, no. 1, 2019, xxxxx://xxx.xxx/10.1145/3322205.3311087. [6] X. Xxxxx and X. Xxxxx, “Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment,” in Baghdad Science Journal, vol. 18, no. 2, 2021, xxxxx://xxx.xxx/10.21123/bsj.2021.18.2(Suppl.).1020. [7] X. Xx-Xxxxxxx, M. A. Xxxxxxx, X. Dssouli, X. Xx-Xxxxx and X. Xxxxx, "Cloud Workflow Resource Shortage Prediction and Fulfillment Using Multiple Adaptation Strategies," 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2018, pp. 974-977, xxxxx://xxx.xxx/10.1109/CLOUD.2018.00149. [8] X. Xxxxx, X. X. Xxxxxx, and M. H. M. Xxxxx, "A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing," 2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022, pp. 383-387, xxxxx://xxx.xxx/10.1109/ICCIT52419.2022.9711663. [9] X. Xxxx and X. X. Xxxxxx, "Loss of trust at IAAS level: Causing factors & mitigation techniques," 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), 2017, pp. 137-143, xxxxx://xxx.xxx/10.1109/IC3TSN.2017.828...
AutoNDA by SimpleDocs
Xxxx and X. Mathuria. Proto ols for Authenti ation and Key Establishment. Springer-Verlag, 2003. [BN03℄ X. Xxxx and J.M.G. Nieto. Round-optimal ontributory onferen e key agree- ment. In Publi Key Cryptography '03, pages 161 174. LNCS 2567, 2003. [BW98℄ K. Be ker and X. Xxxxx. Communi ation omplexity of group key distribution. In Pro eedings of 5th ACM Conferen e on Computer and Communi ations Se- urity, pages 1 6. ACM Press, 1998.
Xxxx and X. Xxxx. S alable proto ols for authenti ated group key ex hange - full version. In Advan es in Cryptology - CRYPTO '03, pages 110 125. LNCS 2729, 2003.
Xxxx and X. Xxxxxx. Protocol failures related to order of encryption and signature: Computation of discrete logarithms in RSA groups, April 1997. (Draft).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!