The SCEAS System
Navigation Menu

Journals in DBLP

J. Log. Algebr. Program.
2005, volume: 64, number: 2

  1. Roberto M. Amadio
    Guest editor's introduction: Special issue on Modelling and Verification of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:155- [Journal]
  2. Michael Backes
    Unifying simulatability definitions in cryptographic systems under different timing assumptions. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:157-188 [Journal]
  3. Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov
    Contract signing, optimism, and advantage. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:189-218 [Journal]
  4. Jean Goubault-Larrecq, Muriel Roger, Kumar Neeraj Verma
    Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:219-251 [Journal]
  5. Neil Evans, Steve A. Schneider
    Verifying security protocols with PVS: widening the rank function approach. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:253-284 [Journal]
  6. Benjamin Aziz, Geoff W. Hamilton, David Gray
    A static analysis of cryptographic processes: the denotational approach. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:285-320 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002