Xxxx and X Sample Clauses

Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange, in: Advances in Cryp- tology – Crypto’03, LNCS 2729, pp. 110–125, 2003.
AutoNDA by SimpleDocs
Xxxx and X. X. Xxxxx. 1997. The range, distribution, and habitat of Sceloporus arenicolus in New Mexico. Final report to New Mexico Department of Game and Fish. Contract #80-516.6-01. 31 pp. Xxxxxxxx, X.X. 1995. Wild animals and settlers on the Great Plains. Univ. of Oklahoma Press, Norman. 316 pp. Xxxxx, X.X. 2002. Landscape features associated with greater prairie-chicken lek locations in Kansas. M. S. Thesis, Emporia State University, Emporia, Kansas. Fuhlendorf, S.D., A.J.W. Xxxxxxxx, X.X. Xxxxxx Xx., and X.X. Xxxxxxxxx. 2002. Multi-scale effects of habitat loss and fragmentation on lesser prairie-chicken populations of the US Southern Great Plains. Lands. Ecol. 17:617-628. Xxxxxx, X.X. 1994a. Movements and nesting habitat of lesser prairie-chicken hens in Colorado. Southwestern Nat. Vol. 39.
Xxxx and X. X. Xxxx. Modeling insider attacks on group key-exchange protocols. In X. Xxxxxx, X. Xxxxxxx, and X. Xxxxx, editors, ACM CCS 05, pages 180 189. ACM Press, Nov. 2005.
Xxxx and X. Xxxxxx, Transaction Processing: Concepts and Techniques, Xxxxxx- Xxxxxxxx, August 1992.
Xxxx and X. Xxxxx. Failure Detection and Consensus in the Crash-Recovery Model. Distributed Computing vol. 13(2), pp. 99–125, 2000.
Xxxx and X. Xxxxxx, ‘New Approaches to the Accountability of International Organizations’, (2019) 16 International Organizations Law Review 1, at 10, having noted, for example, that ‘a new chapter in the conversation about accountability’ was recently opened following allegations of widespread sexual abuse by UN peacekeepers. Ibid., at 3.
Xxxx and X. X. Xxxxx The Functional and Structural Basis of Blood Cell Development ABSTRACTS:
AutoNDA by SimpleDocs
Xxxx and X. Xxxxxx. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Computing, 13(4):850-863, November 1984.
Xxxx and X. Xxxxx. Identity Based Authenticated Key Agreement from Pair- ings. In Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219-233, June 2003. See also Cryptology ePrint Archive, Report 2002/184.
Xxxx and X. Xxxxxx-Xxx. Improved Identity-Based Signcryption. In Proceed- ings of Public Key Cryptography - PKC 2005. LNCS 3386, pp. 362-379. See also Cryptology ePrint Archive, Report 2004/114.
Time is Money Join Law Insider Premium to draft better contracts faster.