Introduction: What's Happening on the Other Channel? (Transcript of Discussion). | 0 | 0.34 | 2013 |
Modular design of data-parallel graph algorithms. | 0 | 0.34 | 2013 |
Enhancements to Prepare-and-Measure Based QKD Protocols. | 2 | 0.39 | 2013 |
Recapitulation. | 0 | 0.34 | 2010 |
More Security or Less Insecurity (Transcript of Discussion). | 0 | 0.34 | 2010 |
Introduction: Virtually Perfect Security (Transcript of Discussion). | 0 | 0.34 | 2010 |
Trust*: Using Local Guarantees to Extend the Reach of Trust. | 0 | 0.34 | 2009 |
Introduction: Brief Encounters. | 0 | 0.34 | 2009 |
Listen too closely and you may be confused | 3 | 0.41 | 2005 |
Safer scripting through precompilation | 1 | 0.37 | 2005 |
Concluding Discussion: Accounting for Resources | 0 | 0.34 | 2002 |
Merkle Puzzles Revisited (Transcript of Discussion) | 0 | 0.34 | 2001 |
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion) | 0 | 0.34 | 2000 |
Auditing against Impossible Abstractions | 1 | 0.39 | 1999 |
Delegation and Not-So Smart Card (Transcript of Discussion) | 0 | 0.34 | 1998 |
To Whom am I Speaking? Remote Booting in a Hostile World | 3 | 1.43 | 1995 |
Self Authenticating Proxies | 3 | 0.67 | 1994 |
Fine grained object protection in UNIX | 2 | 1.20 | 1993 |