Fakultät für Informatik
-
Technische Universität München
Lehrstuhl für Effiziente Algorithmen
Die bibliographische Datenbank LEABib
Suchen
•
Liste der Journale
•
Liste der Serien
•
Liste der Konferenzen
•
Ausgewählte Publikationen
Hilfe
Suche: Journal=Theor.~Comput.~Sci. AND Volume=367
Als [
bib
] [
pdf
] [
ps
] [
dvi
] [
xml
] herunterladen.
Deciding knowledge in security protocols under equational theories
Martín Abadi
,
Véronique Cortier
Theoretical Computer Science
367
(1-2), 2006, pp. 2-32
Compositional analysis of contract-signing protocols
Michael Backes
,
Anupam Datta
,
Ante Derek
,
John C. Mitchell
,
Mathieu Turuani
Theoretical Computer Science
367
(1-2), 2006, pp. 33-56
Formal analysis of Kerberos 5
Frederick Butler
,
Iliano Cervesato
,
Aaron D. Jaggard
,
Andre Scedrov
,
Christopher Walstad
Theoretical Computer Science
367
(1-2), 2006, pp. 57-87
On the semantics of Alice&Bob specifications of security protocols
Carlos Caleiro
,
Luca Viganò
,
David Basin
Theoretical Computer Science
367
(1-2), 2006, pp. 88-122
Probable innocence revisited
Konstantinos Chatzikokolakis
,
Catuscia Palamidessi
Theoretical Computer Science
367
(1-2), 2006, pp. 123-138
Injective synchronisation: An extension of the authentication hierarchy
C.J.F. Cremers
,
S. Mauw
,
E.P. de Vink
Theoretical Computer Science
367
(1-2), 2006, pp. 139-161
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
Santiago Escobar
,
Catherine Meadows
,
José Meseguer
Theoretical Computer Science
367
(1-2), 2006, pp. 162-202
A framework for security analysis of mobile wireless networks
Sebastian Nanz
,
Chris Hankin
Theoretical Computer Science
367
(1-2), 2006, pp. 203-227
A (restricted) quantifier elimination for security protocols
R. Ramanujam
,
S.P. Suresh
Theoretical Computer Science
367
(1-2), 2006, pp. 228-256
Formal analysis of PIN block attacks
Graham Steel
Theoretical Computer Science
367
(1-2), 2006, pp. 257-270
A concise functional neural network computing the largest modulus eigenvalues and their corresponding eigenvectors of a real skew matrix
Yiguang Liu
,
Zhisheng You
,
Liping Cao
Theoretical Computer Science
367
(3), 2006, pp. 273-285
Global convergence of Oja's PCA learning algorithm with a non-zero-approaching adaptive learning rate
Jian Cheng Lv
,
Zhang Yi
,
K.K. Tan
Theoretical Computer Science
367
(3), 2006, pp. 286-307
Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment
Oleg Izmerly
,
Tal Mor
Theoretical Computer Science
367
(3), 2006, pp. 308-323
A genetic system based on simulated crossover of sequences of two-bit genes
Marco Carpentieri
Theoretical Computer Science
367
(3), 2006, pp. 324-335
Synthesis of multi-qudit hybrid and
d
-valued quantum logic circuits by decomposition
Faisal Shah Khan
,
Marek Perkowski
Theoretical Computer Science
367
(3), 2006, pp. 336-346