|
Journals in DBLP
- Riccardo Focardi
Guest editor's preface. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:345-0 [Journal]
- Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Static validation of security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:347-390 [Journal]
- Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi
Information flow in secure contexts. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:391-422 [Journal]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal]
- Joseph Y. Halpern, Kevin R. O'Neill
Anonymity and information hiding in multiagent systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:483-512 [Journal]
- Jonathan K. Millen, Vitaly Shmatikov
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:515-564 [Journal]
- Bogdan Warinschi
A computational analysis of the Needham-Schroeder-(Lowe) protocol. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:565-591 [Journal]
|