Similar Items: Dynamic Tags for Security Protocols
- Modeling Adversaries in a Logic for Security Protocol Analysis
- A Program Logic for Verifying Secure Routing Protocols
- Named Entity Recognition With Clue-Word Tags From Patent Documents in Materials Science
- Corrections to “Multi-Channel Multi-Protocol Quantum Key Distribution System for Secure Image Transmission in Healthcare”
- nf-core/cutandrun: A Nextflow pipeline for the analysis of CUT&RUN, CUT&Tag and TIP-seq datasets
- Reliable Part-of-Speech Tagging of Historical Corpora through Set-Valued Prediction