Journals in DBLP
Catalin Dima , Marius Minea , Ferucio Laurentiu Tiplea Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:1-2 [Journal ] Frédéric Cuppens , Nora Cuppens-Boulahia , Meriam Ben Ghorbel High Level Conflict Management Strategies in Advanced Access Control Models. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:3-26 [Journal ] Clare Dixon , M. Carmen Fernández Gago , Michael Fisher , Wiebe van der Hoek Temporal Logics of Knowledge and their Applications in Security. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:27-42 [Journal ] Tatyana Galibus , Genadii Matveev Generalized Mignotte's Sequences Over Polynomial Rings. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:43-48 [Journal ] Véronique Cortier , Heinrich Hördegen , Bogdan Warinschi Explicit Randomness is not Necessary when Modeling Probabilistic Encryption. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:49-65 [Journal ] Sorin Iftene General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:67-84 [Journal ] Fabio Martinelli , Marinella Petrocchi A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:85-99 [Journal ] Ilaria Matteucci Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:101-120 [Journal ] Romain Janvier , Yassine Lakhnech , Laurent Mazaré Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:121-139 [Journal ]