|
Journals in DBLP
- Mario Bravetti, Roberto Gorrieri
Preface: Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:1-2 [Journal]
- Radu Mardare, Corrado Priami
A Logical Approach to Security in the Context of Ambient Calculus. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:3-29 [Journal]
- Mario Bravetti, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro
Combining Partitions in SecSpaces. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:31-47 [Journal]
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari
Program Transformations under Dynamic Security Policies. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:49-86 [Journal]
- Roberto Zunino
Control Flow Analysis for the Applied Pi-calculus. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:87-110 [Journal]
- Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:111-126 [Journal]
- Annalisa Bossi, Riccardo Focardi, Damiano Macedonio, Carla Piazza, Sabina Rossi
Unwinding in Information Flow Security. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:127-154 [Journal]
- Alessandro Aldini, Alessandra Di Pierro
A Quantitative Approach to Noninterference for Probabilistic Systems. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:155-182 [Journal]
- Angelo Troina, Alessandro Aldini, Roberto Gorrieri
Approximating Imperfect Cryptography in a Formal Model. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:183-203 [Journal]
- Margherita Napoli, Mimmo Parente, Adriano Peron
Specification and Verification of Protocols With Time Constraints. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:205-227 [Journal]
- Salvatore La Torre, Aniello Murano, Mimmo Parente
Model-checking the Secure Release of a Time-locked Secret over a Network. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:229-243 [Journal]
- Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci
Automatic Analysis of the NRL Pump. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:245-266 [Journal]
- Riccardo Focardi, Matteo Maffei
The rho-spi Calculus at Work: Authentication Case Studies. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:267-293 [Journal]
- Chiara Braghin, Carla Piazza
Checking Integrity via CoPS and Banana: the E-Commerce Case Study . [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:295-317 [Journal]
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:319-337 [Journal]
- Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara
Modeling A Certified Email Protocol using I/O Automata. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:339-359 [Journal]
|