|
Conferences in DBLP
"Logic Wins!". [Citation Graph (, )][DBLP]
Higher-Order Program Verification and Language-Based Security. [Citation Graph (, )][DBLP]
Deducibility Constraints. [Citation Graph (, )][DBLP]
Automated Security Proof for Symmetric Encryption Modes. [Citation Graph (, )][DBLP]
Noninterference with Dynamic Security Domains and Policies. [Citation Graph (, )][DBLP]
A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers. [Citation Graph (, )][DBLP]
A Logic for Formal Verification of Quantum Programs. [Citation Graph (, )][DBLP]
Reducing Equational Theories for the Decision of Static Equivalence. [Citation Graph (, )][DBLP]
A Simulation-Based Treatment of Authenticated Message Exchange. [Citation Graph (, )][DBLP]
Trusted Deployment of Virtual Execution Environment in Grid Systems. [Citation Graph (, )][DBLP]
A Dolev-Yao Model for Zero Knowledge. [Citation Graph (, )][DBLP]
A Special Proxy Signature Scheme with Multi-warrant. [Citation Graph (, )][DBLP]
|