𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Modular approach to the design and analysis of password-based security protocols

✍ Scribed by DengGuo Feng; WeiDong Chen


Publisher
Science in China Press (SCP)
Year
2007
Tongue
English
Weight
611 KB
Volume
50
Category
Article
ISSN
1674-733X

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


The use of verbal protocols to understan
✍ Brian M. Kleiner; Colin G. Drury πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 289 KB πŸ‘ 1 views

A study of the effects of increased levels of automation on the human operator illustrates the use of a computer-based approach to the use of verbal protocols as data in skill-based tasks, such as printed circuit board inspection. Subjects provided very detailed protocols at four automation levels,

TBSEβ€”an engineering approach to the desi
✍ John Leach πŸ“‚ Article πŸ“… 2004 πŸ› Elsevier Science 🌐 English βš– 177 KB

For many years, the IT Security industry has been trying to devise a way to quantify risk and the benefits provided by security countermeasures in a form meaningful to senior business management. Threat-Based Security Engineering (TBSE) is a fresh approach to modelling and forecasting information se

A design approach to the structural anal
✍ T. L. Ciardelli; B. Landgraf; R. Gadski; J. Strnad; F. E. Cohen; K. A. Smith πŸ“‚ Article πŸ“… 1988 πŸ› John Wiley and Sons 🌐 English βš– 610 KB

A semi-synthetic protein design approach has been employed for the structural investigation of a putative helical region at the C-terminus of Interleukin-2. With crystallographic or NMR derived conformational data as yet unavailable, we have relied only on primary sequence information and computer-a