Journals in DBLP
Maurice H. ter Beek , Fabio Gadducci Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:1-3 [Journal ] Jan Münther On the Security of Security Software: Invited Position Paper. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:5-10 [Journal ] Giampaolo Bella , Stefano Bistarelli , Simon N. Foley Soft Constraints for Security. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal ] Jan Jürjens Foundations for Designing Secure Architectures. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:31-46 [Journal ] Claudio Agostino Ardagna , Ernesto Damiani , Sabrina De Capitani di Vimercati , Pierangela Samarati A Web Service Architecture for Enforcing Access Control Policies. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:47-62 [Journal ] Giampaolo Bella , Costantino Pistagna , Salvatore Riccobene Distributed Backup through Information Dispersal. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:63-77 [Journal ] Agustina Buccella , Alejandra Cechich , Nieves R. Brisaboa A Federated Layer to Integrate Heterogeneous Knowledge. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:79-97 [Journal ] Cas J. F. Cremers Compositionality of Security Protocols: A Research Agenda. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:99-110 [Journal ] Lavinia Egidi , Marinella Petrocchi Modelling a Secure Agent with Team Automata. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:111-127 [Journal ] Antonio Fariña , Nieves R. Brisaboa , Cristina París , José R. Paramá Fast and Flexible Compression for Web Search Engines. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:129-141 [Journal ] Torsten Fink , Manuel Koch , Karl Pauls An MDA approach to Access Control Specifications Using MOF and UML Profiles. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:161-179 [Journal ] Kamil Kulesza , Zbigniew Kotulski , Konrad Kulesza On Mobile Agents Resistance to Traffic Analysis. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:181-193 [Journal ] Sebastian Nanz , Chris Hankin Formal Security Analysis for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:195-213 [Journal ] Sanjay Rawat , Arun K. Pujari , Ved Prakash Gulati On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:215-228 [Journal ] Emilio Tuosto , Hugo Torres Vieira An Observational Model for Spatial Logics. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:229-254 [Journal ]