Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             9 results found
no title author magazine year volume issue page(s) type
1 Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks Kremer, Steve
2005
128 5 p. 87-104
18 p.
article
2 Continuous-Time Probabilistic KLAIM Di Pierro, Alessandra
2005
128 5 p. 27-38
12 p.
article
3 Data Privacy in Tuple Space Based Mobile Agent Systems Bettini, Lorenzo
2005
128 5 p. 3-16
14 p.
article
4 Flow-sensitive Leakage Analysis in Mobile Ambients Braghin, Chiara
2005
128 5 p. 17-25
9 p.
article
5 On the Expressiveness of Probabilistic and Prioritized Data-retrieval in Linda Bravetti, Mario
2005
128 5 p. 39-53
15 p.
article
6 Preface Focardi, Riccardo
2005
128 5 p. 1-2
2 p.
article
7 RBAC for Organisation and Security in an Agent Coordination Infrastructure Omicini, Andrea
2005
128 5 p. 65-85
21 p.
article
8 Tags for Multi-Protocol Authentication Maffei, Matteo
2005
128 5 p. 55-63
9 p.
article
9 Team Automata for Security ter Beek, Maurice H.
2005
128 5 p. 105-119
15 p.
article
                             9 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands