Related Studies

Analysis and simulations of timed security protocols

The search terms have been selected by the author(s). They can be altered or deleted by the reader, as two or three short, precise terms or phrases produced the best Boolean (AND) searches. To learn more about the resources searched, click on ABOUT. These resources have been selected for their relevance and open (free) access to all or part of their contents.

Search Terms AND
AND

1. arXiv.org About
 
2. CiteSeer About
 
3. Collection of Computer Science Bibliographies About
 
4. NCSTRL About
 
5. DOE Information Bridge About
 
6. devx About
 
7. HCI Bibliography: : Human-Computer Interaction Resources About
 
Suggest a source