Xxxxxxxxx and X Sample Clauses

Xxxxxxxxx and X. Xxxxxxx. A
AutoNDA by SimpleDocs
Xxxxxxxxx and X. X. Xxxxxxxxx, Org. Biomol. Chem., 2010, 8, 4503–4513. 35 X. Xxx and X. X. Xxxxx, Chem. Soc. Rev., 2010, 39, 1262–1271. 36 X. X. Xxxx´ , in Science of Synthesis: Xxxxxx–Weyl Methods of Molecular Transformations, ed. X. X. Xxxxx and X. X. Xxxxxxxxx, Xxxxxx, Stuttgart, 2004, vol. 13, pp. 415–601. 37 X. X. Xxxx and K. B. Xxxxxxxxx, Drug Discovery Today, 2003, 8, 1128–1137.
Xxxxxxxxx and X. Xxxxxxx, A Secure and Effi- cient Conference Key Distribution System, Proc. of EUROCRYPT’94, LNCS 950, pp. 275-286. Springer, May 1994. [3] X. Xxxxxxxxxxx and X. Xxxxx, Security Arguments for Digital Signatures and Blind Signatures, J. of Cryptology, vol. 13, pp. 361-396, 2000. [4] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxxxxxxxxxx, and X. Xxxxxxxxxx. Provably Authenticated Group Xxxxxx- Xxxxxxx Key Exchange, 8th ACM conference on Computer and Communications Security (CCS’01), pages 255-264. ACM Press, 2001. [5] X. Xxxxx and X. Xxxxxxxx, Identity-based encryp- tion from the Weil pairing, Proc. of Crypto’01, LNCS 2139, pp.213-229, Springer-Verlag, 2001. [6] X. Xxxx and X. Xxxx, Scalable Protocols for Authenticated Group Key Exchange, Proc. of Crypto’03, LNCS 2729, pp.110-125, Springer, 2003. [7] X. X. Xxxxx and X.F. Xxxx, Attack on Two ID-based Authenticated Group Key Agreement Schemes, Cryptology ePrint Archive: Report 2003/259. [8] X. X. Xxxx, X. X. Xxxxx and X. X. Xxx, Effi- cient ID- based Group Key Agreement with Bilinear Maps, Proc. of PKC’04, LNCS 2947, pp.130-144, Springer-Verlag, 2004. [9] X. X. Xxx, X. X. Xxx, X. X. Xx, and X. X. Xxx, One Round Identity-Based Authenticated Confer- ence Agreement Protocol, Proc. of ECUMN 2004, LNCS 3262, pp.407-416, Springer-Verlag, 2004. [10] X. Xxx, X. Xxxx, and X. Xx, ID-Based One Round Authenticated Group Key Agreement Pro- tocol with Bilinear Pairings, Proc. of International Conference on Information Technology: Coding and Computing (ITCC’05), vol.I, pp.757-761, 2005. [11] X. Xxxx, X. X. Xxxxx, and X. Xxx, Batch verifica- tions with ID-based signatures, Proc. of ICISC ’04, LNCS 3506, pp.233-248, Springer-Verlag, 2005. [12] X. Xxxx, X. Xxxxxx, and X. Mu, Efficient ID-based Authenticated Group Key Agreement from Bilin- ear Pairings, Proc. of Mobile Ad-hoc and Sensor Networks (MSN 2006), LNCS 4325, pp.521-532, Springer-Verlag, 2006. [13] X. X. Xxxx, Further Analysis of ID-Based Authen- ticated Group Key Agreement Protocol from Bilin- ear Maps, IEICE Trans. Fundamentals, vol.E90-A, no.1, pp.231-233, 2007. [14] X. X. Xxxx, X. X. Xxxxx and X. X. Xxx, ID- Based Authenticated Group Key Agreement Secure against Insider Attacks, IEICE Trans. Fundamen- tals, vol.E91-A, no.7, pp.1828-1830, 2008.
Xxxxxxxxx and X. Xxxxxxx: A secure and efficient conference key distribution system. Eurocrypt’94, LNCS 950, pp.275–286, 1994. [17] X. Xxxxxx and M.E. Xxxxxxx: New Directions in cryptography. IEEE Transactions on Information Theory, vol.22, pp.644-654, 1976. [18] X. Xxxxxx, X. xxx Xxxxxxxx, and X. Xxxxxx: Authentication and authenticated key ex- changes. Designs, Codes, and Cryptography, vol.2, pp.107–125, 1992. [19] X. XxXxxxx: A public key cryptosystem and a signature scheme based on discrete loga- rithms. IEEE Trans. on Information Theory, vol.31, no.4, pp.469–472, July 1985. [20] X. Xxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx, “A digital signature scheme secure against adap- tive chosen-message attacks. SIAM Journal of Computing, vol.17, no.2, pp.281–308, 1988. [21] X. Xxxxxxxxxxx, X. Xxxx, and X. Xxxx: A conference key distribution system. IEEE Trans. on Information Theory, vol.28, no.5, pp.714–720, September 1982. [22] M. Just and X. Xxxxxxxx: Authenticated multi-party key agreement. Asiacrypt’96, LNCS 1163, pp.36-49, 1996. [23] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. of 7th ACM Conf. on Computer and Communications Security, pp.235–244, 2000. [24] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Communication-efficient group key agreement. In Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC’01), pp.229–244, June 2001. [25] X. Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange. Crypto’03, LNCS 2729, pp.110–125, August 2003.
Xxxxxxxxx and X. Xxxxxxxxxxx. Shapes constraint language (shacl) - proposed recommendation, 6 2017. [Last accessed on 2017/07/06].
Xxxxxxxxx and X. Xxxxxxx. A secure and efficient conference key distribution system. In A. D. Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science, pages 275–286. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. Final version of proceedings.
Xxxxxxxxx and X. Xxxxxxx: A secure and efficient conference key distribution system, in: Advances in Cryptology – Eurocrypt’94, LNCS 950, pp. 275–286, 1994. 14. X. Xxxxxxx, X. Xxxxxxxx, and X. Xxxxxx: Intercepting mobile communications: The insecurity of 802.11, in: Proceedings of the 7th International Conference on Mobile Computing And Networking (Mobi- Com’01), July, 2001.
AutoNDA by SimpleDocs
Xxxxxxxxx and X. Xxxxx. A framework for requirements monitoring of service based systems. In Proceedings of ICSOC, 2003.
Xxxxxxxxx and X. Xxxxxx. On expressing and monitoring behaviour in contracts. In Proceedings of EDOC, Lausanne, Switzerland, 2002.
Xxxxxxxxx and X. Xxxxxx, Large-area thin films of the spin crossover complex [Fe(bapbpy)(NCS)2] grown selectively on graphene. In preparation for publication. X.X. xxx Xxxxx, X. xx Xxxxxx, X. Xxx, X. xxx Xxxxxx, X. Xxxxxx, and X.X. Xxxxxxxxx, Polymer coated graphene-based gas sensors: chemical fingerprinting by simultaneous sensing. In preparation for publication. Patent application filed.
Time is Money Join Law Insider Premium to draft better contracts faster.