nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
|
Armando, Alessandro |
|
2005 |
125 |
1 |
p. 91-108 18 p. |
artikel |
2 |
Attacking Group Multicast Key Management Protocols Using Coral
|
Steel, Graham |
|
2005 |
125 |
1 |
p. 125-144 20 p. |
artikel |
3 |
Believing the Integrity of a System
|
Foley, Simon N. |
|
2005 |
125 |
1 |
p. 3-12 10 p. |
artikel |
4 |
Deciding the Security of Protocols with Commuting Public Key Encryption
|
Chevalier, Yannick |
|
2005 |
125 |
1 |
p. 55-66 12 p. |
artikel |
5 |
Extending Security Protocol Analysis: New Challenges
|
Bond, Mike |
|
2005 |
125 |
1 |
p. 13-24 12 p. |
artikel |
6 |
Metareasoning about Security Protocols using Distributed Temporal Logic
|
Caleiro, Carlos |
|
2005 |
125 |
1 |
p. 67-89 23 p. |
artikel |
7 |
On the Relative Soundness of the Free Algebra Model for Public Key Encryption
|
Lynch, Christopher |
|
2005 |
125 |
1 |
p. 43-54 12 p. |
artikel |
8 |
Preface
|
Armando, Alessandro |
|
2005 |
125 |
1 |
p. 1- 1 p. |
artikel |
9 |
Satisfiability of Dolev-Yao Constraints
|
Mazaré, Laurent |
|
2005 |
125 |
1 |
p. 109-124 16 p. |
artikel |
10 |
Synthesising Efficient and Effective Security Protocols
|
Hao, Chen |
|
2005 |
125 |
1 |
p. 25-41 17 p. |
artikel |
11 |
The ASW Protocol Revisited: A Unified View
|
Hankes Drielsma, Paul |
|
2005 |
125 |
1 |
p. 145-161 17 p. |
artikel |