The SCEAS System
Navigation Menu

Journals in DBLP

Electr. Notes Theor. Comput. Sci.
2005, volume: 125, number: 1

  1. Alessandro Armando, Luca Viganò
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:1-0 [Journal]
  2. Simon N. Foley
    Believing the Integrity of a System: (Invited Talk). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:3-12 [Journal]
  3. Mike Bond, Jolyon Clulow
    Extending Security Protocol Analysis: New Challenges. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:13-24 [Journal]
  4. Chen Hao, John A. Clark, Jeremy L. Jacob
    Synthesising Efficient and Effective Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal]
  5. Christopher Lynch, Catherine Meadows
    On the Relative Soundness of the Free Algebra Model for Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:43-54 [Journal]
  6. Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
    Deciding the Security of Protocols with Commuting Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:55-66 [Journal]
  7. Carlos Caleiro, Luca Viganò, David A. Basin
    Metareasoning about Security Protocols using Distributed Temporal Logic. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:67-89 [Journal]
  8. Alessandro Armando, Luca Compagna
    An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:91-108 [Journal]
  9. Laurent Mazaré
    Satisfiability of Dolev-Yao Constraints. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:109-124 [Journal]
  10. Graham Steel, Alan Bundy
    Attacking Group Multicast Key Management Protocols Using Coral. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:125-144 [Journal]
  11. Paul Hankes Drielsma, Sebastian Mödersheim
    The ASW Protocol Revisited: A Unified View. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:145-161 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002