Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Journal=Inf.~Comput. AND Volume=238
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Static analysis of XML security views and query rewriting
Benoît Groz
,
Sƚawomir Staworko
,
Anne-Cecile Caron
,
Yves Roos
,
Sophie Tison
Information and Computation
238
, 2014, pp. 2-29
Modeling and verifying ad hoc routing protocols
Mathilde Arnaud
,
Véronique Cortier
,
Stéphanie Delaune
Information and Computation
238
, 2014, pp. 30-67
Typing access control and secure information flow in sessions
Sara Capecchi
,
Ilaria Castellani
,
Mariangiola Dezani-Ciancaglini
Information and Computation
238
, 2014, pp. 68-105
Deducibility constraints and blind signatures
Sergiu Bursuc
,
Hubert Comon-Lundh
,
Stéphanie Delaune
Information and Computation
238
, 2014, pp. 106-127
Efficient general AGH-unification
Zhiqiang Liu
,
Christopher Lynch
Information and Computation
238
, 2014, pp. 128-156
State space reduction in the Maude-NRL Protocol Analyzer
Santiago Escobar
,
Catherine Meadows
,
José Meseguer
,
Sonia Santiago
Information and Computation
238
, 2014, pp. 157-186
A metamodel of access control for distributed environments: Applications and properties
Clara Bertolissi
,
Maribel Fernández
Information and Computation
238
, 2014, pp. 187-207
A generic security API for symmetric key management on cryptographic devices
Véronique Cortier
,
Graham Steel
Information and Computation
238
, 2014, pp. 208-232
Bounded memory Dolev-Yao adversaries in collaborative systems
Max Kanovich
,
Tajana Ban Kirigin
,
Vivek Nigam
,
Andre Scedrov
Information and Computation
238
, 2014, pp. 233-261