|
Journals in DBLP
- Somesh Jha, Thomas W. Reps
Model checking SPKI/SDSI. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:317-353 [Journal]
- Vitaly Shmatikov
Probabilistic analysis of an anonymity system. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:355-377 [Journal]
- Philippa J. Broadfoot, A. W. Roscoe
Embedding agents within the intruder to detect parallel attacks. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:379-408 [Journal]
- Joshua D. Guttman
Authentication tests and disjoint encryption: A design method for security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:409-433 [Journal]
- Andrew D. Gordon, Alan Jeffrey
Types and effects for asymmetric cryptographic protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:435-483 [Journal]
- Dominic Duggan
Type-based cryptographic operations. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:485-550 [Journal]
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
A formal model of rational exchange and its application to the analysis of Syverson's protocol. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:551-587 [Journal]
- Michael Backes, Birgit Pfitzmann, Michael Waidner
Polynomial liveness. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:589-617 [Journal]
- Gavin Lowe
Defining information flow quantity. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:619-653 [Journal]
|