nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A generic security API for symmetric key management on cryptographic devices
|
Cortier, Véronique |
|
2014 |
238 |
C |
p. 208-232 25 p. |
artikel |
2 |
A metamodel of access control for distributed environments: Applications and properties
|
Bertolissi, Clara |
|
2014 |
238 |
C |
p. 187-207 21 p. |
artikel |
3 |
Bounded memory Dolev–Yao adversaries in collaborative systems
|
Kanovich, Max |
|
2014 |
238 |
C |
p. 233-261 29 p. |
artikel |
4 |
Deducibility constraints and blind signatures
|
Bursuc, Sergiu |
|
2014 |
238 |
C |
p. 106-127 22 p. |
artikel |
5 |
Editorial Board
|
|
|
2014 |
238 |
C |
p. i- 1 p. |
artikel |
6 |
Editorial Board
|
|
|
2014 |
238 |
C |
p. IFC- 1 p. |
artikel |
7 |
Efficient general AGH-unification
|
Liu, Zhiqiang |
|
2014 |
238 |
C |
p. 128-156 29 p. |
artikel |
8 |
Foreword to the special issue on security and rewriting techniques
|
Kremer, Steve |
|
2014 |
238 |
C |
p. 1- 1 p. |
artikel |
9 |
Modeling and verifying ad hoc routing protocols
|
Arnaud, Mathilde |
|
2014 |
238 |
C |
p. 30-67 38 p. |
artikel |
10 |
State space reduction in the Maude-NRL Protocol Analyzer
|
Escobar, Santiago |
|
2014 |
238 |
C |
p. 157-186 30 p. |
artikel |
11 |
Static analysis of XML security views and query rewriting
|
Groz, Benoît |
|
2014 |
238 |
C |
p. 2-29 28 p. |
artikel |
12 |
Typing access control and secure information flow in sessions
|
Capecchi, Sara |
|
2014 |
238 |
C |
p. 68-105 38 p. |
artikel |