Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             9 results found
no title author magazine year volume issue page(s) type
1 An overview of the verification of SET Bella, Giampaolo
2005
4 1-2 p. 17-28
article
2 Detection of file-based race conditions Lhee, Kyung-suk
2005
4 1-2 p. 105-119
article
3 Edit automata: enforcement mechanisms for run-time security policies Ligatti, Jay
2004
4 1-2 p. 2-16
article
4 Game strategies in network security Lye, Kong-wei
2005
4 1-2 p. 71-86
article
5 On the decidability of cryptographic protocolswith open-ended data structures Küsters, Ralf
2004
4 1-2 p. 49-70
article
6 On the sequence of authorization policy transformations Bai, Yun
2005
4 1-2 p. 120-131
article
7 Preface to the special issue of selected papers from FCS/VERIFY 2002 Autexier, Serge
2004
4 1-2 p. 1
article
8 Rigorous automated network security management Guttman, Joshua D.
2004
4 1-2 p. 29-48
article
9 Static use-based object confinement Skalka, Christian
2004
4 1-2 p. 87-104
article
                             9 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands