no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
|
Kremer, Steve |
|
2005 |
128 |
5 |
p. 87-104 18 p. |
article |
2 |
Continuous-Time Probabilistic KLAIM
|
Di Pierro, Alessandra |
|
2005 |
128 |
5 |
p. 27-38 12 p. |
article |
3 |
Data Privacy in Tuple Space Based Mobile Agent Systems
|
Bettini, Lorenzo |
|
2005 |
128 |
5 |
p. 3-16 14 p. |
article |
4 |
Flow-sensitive Leakage Analysis in Mobile Ambients
|
Braghin, Chiara |
|
2005 |
128 |
5 |
p. 17-25 9 p. |
article |
5 |
On the Expressiveness of Probabilistic and Prioritized Data-retrieval in Linda
|
Bravetti, Mario |
|
2005 |
128 |
5 |
p. 39-53 15 p. |
article |
6 |
Preface
|
Focardi, Riccardo |
|
2005 |
128 |
5 |
p. 1-2 2 p. |
article |
7 |
RBAC for Organisation and Security in an Agent Coordination Infrastructure
|
Omicini, Andrea |
|
2005 |
128 |
5 |
p. 65-85 21 p. |
article |
8 |
Tags for Multi-Protocol Authentication
|
Maffei, Matteo |
|
2005 |
128 |
5 |
p. 55-63 9 p. |
article |
9 |
Team Automata for Security
|
ter Beek, Maurice H. |
|
2005 |
128 |
5 |
p. 105-119 15 p. |
article |