The SCEAS System
Navigation Menu

Journals in DBLP

Theor. Comput. Sci.
2006, volume: 367, number: 1-2

  1. Pierpaolo Degano, Luca Viganò
    Preface. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:1- [Journal]
  2. Martín Abadi, Véronique Cortier
    Deciding knowledge in security protocols under equational theories. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:2-32 [Journal]
  3. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
  4. Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad
    Formal analysis of Kerberos 5. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:57-87 [Journal]
  5. Carlos Caleiro, Luca Viganò, David A. Basin
    On the semantics of Alice&Bob specifications of security protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:88-122 [Journal]
  6. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Probable innocence revisited. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:123-138 [Journal]
  7. Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink
    Injective synchronisation: An extension of the authentication hierarchy. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:139-161 [Journal]
  8. Santiago Escobar, Catherine Meadows, José Meseguer
    A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:162-202 [Journal]
  9. Sebastian Nanz, Chris Hankin
    A framework for security analysis of mobile wireless networks. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:203-227 [Journal]
  10. Ramaswamy Ramanujam, S. P. Suresh
    A (restricted) quantifier elimination for security protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:228-256 [Journal]
  11. Graham Steel
    Formal analysis of PIN block attacks. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:257-270 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002