The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Computer Security
2003, volume: 11, number: 2

  1. Peter Sewell, Jan Vitek
    Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:135-188 [Journal]
  2. Ernie Cohen
    First-order Verification of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:189-216 [Journal]
  3. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal]
  4. Pankaj Kakkar, Carl A. Gunter, Martín Abadi
    Reasoning About Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:245-287 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002