Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             11 results found
no title author magazine year volume issue page(s) type
1 An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols Armando, Alessandro
2005
125 1 p. 91-108
18 p.
article
2 Attacking Group Multicast Key Management Protocols Using Coral Steel, Graham
2005
125 1 p. 125-144
20 p.
article
3 Believing the Integrity of a System Foley, Simon N.
2005
125 1 p. 3-12
10 p.
article
4 Deciding the Security of Protocols with Commuting Public Key Encryption Chevalier, Yannick
2005
125 1 p. 55-66
12 p.
article
5 Extending Security Protocol Analysis: New Challenges Bond, Mike
2005
125 1 p. 13-24
12 p.
article
6 Metareasoning about Security Protocols using Distributed Temporal Logic Caleiro, Carlos
2005
125 1 p. 67-89
23 p.
article
7 On the Relative Soundness of the Free Algebra Model for Public Key Encryption Lynch, Christopher
2005
125 1 p. 43-54
12 p.
article
8 Preface Armando, Alessandro
2005
125 1 p. 1-
1 p.
article
9 Satisfiability of Dolev-Yao Constraints Mazaré, Laurent
2005
125 1 p. 109-124
16 p.
article
10 Synthesising Efficient and Effective Security Protocols Hao, Chen
2005
125 1 p. 25-41
17 p.
article
11 The ASW Protocol Revisited: A Unified View Hankes Drielsma, Paul
2005
125 1 p. 145-161
17 p.
article
                             11 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands