|
Journals in DBLP
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal]
- Chiara Bodei, Pierpaolo Degano, Corrado Priami
Checking security policies through an enhanced Control Flow Analysis. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:49-85 [Journal]
- Michele Bugliesi, Sabina Rossi
Non-interference proof techniques for the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:87-113 [Journal]
- Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka
Verifying information flow goals in Security-Enhanced Linux. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:115-134 [Journal]
- Ramaswamy Ramanujam, S. P. Suresh
Decidability of context-explicit security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:135-165 [Journal]
- Vitaly Shmatikov, Carolyn L. Talcott
Reputation-based trust management. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:167-190 [Journal]
|