Xxxxxxxxx and X Sample Clauses

Xxxxxxxxx and X. Xxxxxxx. A
AutoNDA by SimpleDocs
Xxxxxxxxx and X. X. Xxxxxxxxx, Org. Biomol. Chem., 2010, 8, 4503–4513. 35 X. Xxx and X. X. Xxxxx, Chem. Soc. Rev., 2010, 39, 1262–1271. 36 X. X. Xxxx´ , in Science of Synthesis: Xxxxxx–Weyl Methods of Molecular Transformations, ed. X. X. Xxxxx and X. X. Xxxxxxxxx, Xxxxxx, Stuttgart, 2004, vol. 13, pp. 415–601. 37 X. X. Xxxx and K. B. Xxxxxxxxx, Drug Discovery Today, 2003, 8, 1128–1137.
Xxxxxxxxx and X. Xxxxxxx: A secure and efficient conference key distribution system. Eurocrypt’94, LNCS 950, pp.275–286, 1994. [17] X. Xxxxxx and M.E. Xxxxxxx: New Directions in cryptography. IEEE Transactions on Information Theory, vol.22, pp.644-654, 1976. [18] X. Xxxxxx, X. xxx Xxxxxxxx, and X. Xxxxxx: Authentication and authenticated key ex- changes. Designs, Codes, and Cryptography, vol.2, pp.107–125, 1992. [19] X. XxXxxxx: A public key cryptosystem and a signature scheme based on discrete loga- rithms. IEEE Trans. on Information Theory, vol.31, no.4, pp.469–472, July 1985. [20] X. Xxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx, “A digital signature scheme secure against adap- tive chosen-message attacks. SIAM Journal of Computing, vol.17, no.2, pp.281–308, 1988. [21] X. Xxxxxxxxxxx, X. Xxxx, and X. Xxxx: A conference key distribution system. IEEE Trans. on Information Theory, vol.28, no.5, pp.714–720, September 1982. [22] M. Just and X. Xxxxxxxx: Authenticated multi-party key agreement. Asiacrypt’96, LNCS 1163, pp.36-49, 1996. [23] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. of 7th ACM Conf. on Computer and Communications Security, pp.235–244, 2000. [24] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Communication-efficient group key agreement. In Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC’01), pp.229–244, June 2001. [25] X. Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange. Crypto’03, LNCS 2729, pp.110–125, August 2003.
Xxxxxxxxx and X. Xxxxxxx. A secure and efficient con- xxxxxxx key distribution system. In Advances in Cryptology – EUROCRYPT ’94, volume 950 of Lecture Notes in Computer Science, pages 275–286. Springer-Verlag, 1995. [2] X. Xxxxxx and X. Xxxxxxx. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644– 654, 1976. [3] X. Xxx, X. Xxxxxx, and X. Xxxxxx. Simple and fault-tolerant key agreement for dynamic collaborative groups. Proc. of 7th ACM Conference on Computer and Communications Se- curity, pages 235–244, November 2000. [4] X. Xxx, X. Xxxxxx, and X. Xxxxxx. Communication-efficient group key agreement. Information Systems Security, Pro- ceedings of the 17th International Information Security Con- xxxxxxx IFIP SEC’01, November 2001. [5] X. X. X. Xxx, J. C. S. Lui, and D. K. Y. Yau. Distributed col- laborative key agreement protocols for dynamic peer groups. Technical report cs-tr-2002-04, Dept of Computer Science and Engineering, Chinese University of Hong Kong, May 2002. Also as CS TR-02-013, Purdue University, West Lafayette, IN. [6] X. S. Xx, X. X. Xxxx, X. X. Xxxxx, and X. X. Xxx. Batch rekeying for secure group communications. Proceedings of Tenth International World Wide Web Conference (WWW10), May 2001. [7] X. Xxxxx, X. Xxxxxxx, and X. Xxxxxxx. Kronos: A scalable group re-keying approach for secure multicast. Proc. of IEEE Sym- posium on Security and Privacy 2000, May 2000. [8] X. Xxxxxxxxx. Cryptography and Network Security: Princi- ples and Practice. Prentice Hall, 2nd edition, 1999. [9] X. Xxxxxxx, X. Xxxxxx, and X. Xxxxxxx. CLIQUES: A new approach to group key agreement. IEEE International Xxx- xxxxxxx on Distributed Computing Systems, pages 380–387, May 1998. [10] X. X. Xxxxxxx, X. X. Xxxxxx, and X. X. Xxxx. Key man- agement for multicast: Issues and architectures. Inter- net draft draft-xxxxxxx-key-arch-00.txt, Internet Engineering Task Force, July 1999. Expires in six months. [11] X. X. Xxxx, X. Xxxxx, and X. X. Xxx. Secure group com- munications using key graphs. Proc. of ACM SIGCOMM’98, September 1998. [12] Y. R. Xxxx, X. S. Li, X. B. Xxxxx, and X. X. Xxx. Reli- able group rekeying: A performance analysis. Proc. of ACM SIGCOMM’01, August 2001. Average number of exponentiations 7000 6000 5000 4000 3000 2000 1000 0 Rebuild Batch Queue-batch 0 000 000 000 400 500 Number of leaves (a) = 128 9000 Average number of exponentiations 8000 7000 6000 5000 4000 3000 2000 1000 0 Rebuild Batch Queue-batch 0 000 000 000 400 500 Number of leav...
Xxxxxxxxx and X. Xxxxxxxxxxx. Shapes constraint language (shacl) - proposed recommendation, 6 2017. [Last accessed on 2017/07/06].
Xxxxxxxxx and X. Xxxxxxx. A secure and efficient conference key distribution system. In A. D. Santis, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science, pages 275–286. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. Final version of proceedings.
Xxxxxxxxx and X. Xxxxxx, Large-area thin films of the spin crossover complex [Fe(bapbpy)(NCS)2] grown selectively on graphene. In preparation for publication. X.X. xxx Xxxxx, X. xx Xxxxxx, X. Xxx, X. xxx Xxxxxx, X. Xxxxxx, and X.X. Xxxxxxxxx, Polymer coated graphene-based gas sensors: chemical fingerprinting by simultaneous sensing. In preparation for publication. Patent application filed.
AutoNDA by SimpleDocs
Xxxxxxxxx and X. Xxxxxx. Monitoring a ruthenium-based photoreaction with graphene on paper. In preparation for publication. X.X. xxx Xxxxx, X. Xxxxxxxx, X. Xxxxx, X. xxx Xxxxxxx, X. Xxxxxxxx, X. Xxxxxx and
Xxxxxxxxx and X. Xxxxxx. [Ru(3)(biq)(STF-31)]2+: A lock-and-kill anticancer PACT agent. In preparation for publication.
Xxxxxxxxx and X. Xxxxxxx: A secure and efficient conference key distribution system, in: Advances in Cryptology – Eurocrypt’94, LNCS 950, pp. 275–286, 1994. 14. X. Xxxxxxx, X. Xxxxxxxx, and X. Xxxxxx: Intercepting mobile communications: The insecurity of 802.11, in: Proceedings of the 7th International Conference on Mobile Computing And Networking (Mobi- Com’01), July, 2001.
Time is Money Join Law Insider Premium to draft better contracts faster.