nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Automata Based Approach for Verifying Information Flow Properties
|
D'Souza, Deepak |
|
2005 |
135 |
1 |
p. 39-58 20 p. |
artikel |
2 |
A Syntactic Criterion for Injectivity of Authentication Protocols
|
Cremers, C.J.F. |
|
2005 |
135 |
1 |
p. 23-38 16 p. |
artikel |
3 |
Deconstructing Alice and Bob
|
Caleiro, Carlos |
|
2005 |
135 |
1 |
p. 3-22 20 p. |
artikel |
4 |
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic
|
Imamoto, Kenji |
|
2005 |
135 |
1 |
p. 79-94 16 p. |
artikel |
5 |
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
|
Nesi, Monica |
|
2005 |
135 |
1 |
p. 95-114 20 p. |
artikel |
6 |
Preface
|
Degano, Pierpaolo |
|
2005 |
135 |
1 |
p. 1-2 2 p. |
artikel |
7 |
Static Validation of a Voting Protocol
|
Nielsen, Christoffer Rosenkilde |
|
2005 |
135 |
1 |
p. 115-134 20 p. |
artikel |
8 |
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
|
Gotsman, Alexey |
|
2005 |
135 |
1 |
p. 59-77 19 p. |
artikel |