-
1
Method of designing security protocol for remote attestation
Published 2008-01-01Subjects: “…remote attestation;verification protocol;evolution computing;BAN-like logic…”
Get full text
Article -
2
Method of designing security protocol for remote attestation
Published 2008-01-01Subjects: Get full text
Article -
3
Efficiency and Relevance of Verificatory Events Conducted by Biological and Toxin Weapons Convention (Modern Period). Insights in History of VEREX and AHG
Published 2025-05-01Subjects: “…legally binding verification protocol…”
Get full text
Article -
4
Resource Integrity Vulnerabilities and Protections in RPG Games: A Case Study of Elancia
Published 2025-01-01Subjects: Get full text
Article