Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Publication Type Guide to computer network security 2015-05-19 Paper Guide to computer network security 2012-10-11 Paper Computer Network Security 2005-05-04 Paper...
    10 bytes (18 words) - 10:19, 6 October 2023
  • 2014-04-10 Paper Computer-Aided Cryptographic Proofs 2012-09-20 Paper Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs 2012-09-05...
    10 bytes (18 words) - 12:52, 6 October 2023
  • Paper Theoretical Computer Science 2010-02-23 Paper Variations on a theme by Akl and Taylor: security and tradeoffs 2009-12-01 Paper Security and Tradeoffs...
    10 bytes (17 words) - 22:08, 10 December 2023
  • Paper Formal security proofs with minimal fuss: implicit computational complexity at work 2015-05-04 Paper Certifying assembly with formal security proofs:...
    10 bytes (18 words) - 14:53, 28 January 2024
  • Processes to Check and Ensure Information Flow Security* 2011-05-06 Paper A Proof System for Information Flow Security 2011-03-04 Paper Theoretical Foundations...
    10 bytes (17 words) - 08:51, 13 December 2023
  • 2007-11-29 Paper Information Security and Cryptology - ICISC 2005 2007-05-02 Paper Information Security 2006-10-16 Paper Information Security and Privacy 2006-06-22...
    10 bytes (16 words) - 20:19, 11 December 2023
  • 2022-11-02 Paper Security Issues in Service Composition 2021-05-25 Paper Natural projection as partial model checking 2020-11-02 Paper Security Metrics at Work...
    10 bytes (17 words) - 02:13, 10 December 2023
  • Paper Theoretical Computer Science 2010-02-23 Paper Variations on a theme by Akl and Taylor: security and tradeoffs 2009-12-01 Paper Security and Tradeoffs...
    10 bytes (19 words) - 10:28, 11 December 2023
  • analysis of concurrent programs 2022-08-16 Paper Security Issues in Service Composition 2021-05-25 Paper Security Metrics at Work on the Things in IoT Systems...
    10 bytes (18 words) - 18:00, 9 December 2023
  • optimal pixel expansion 2007-01-09 Paper Cryptology and Network Security 2006-11-14 Paper Security in Communication Networks 2006-10-10 Paper Optimal colored...
    10 bytes (17 words) - 02:30, 13 December 2023
  • Mathematical Foundations of Computer Science 2005 2006-10-20 Paper Progress in Cryptology – Mycrypt 2005 2006-10-05 Paper Information Security and Privacy 2006-06-22...
    10 bytes (18 words) - 17:16, 11 December 2023
  • Publication Date of Publication Type Key-schedule security for the TLS 1.3 standard 2023-08-25 Paper A calculus of mobile agents 2023-06-28 Paper Implicit...
    10 bytes (16 words) - 18:04, 9 December 2023
  • Ignorance 2014-08-21 Paper The Exact Security of Digital Signatures-How to Sign with RSA and Rabin 2014-08-20 Paper Security of Symmetric Encryption against...
    10 bytes (17 words) - 16:42, 7 December 2023
  • synchronous notions of information flow security 2016-05-02 Paper Two Applications of Epistemic Logic in Computer Security 2015-04-17 Paper Information flow...
    10 bytes (20 words) - 14:11, 10 December 2023
  • (Tutorial Notes) 2009-10-22 Paper Security Protocols: Principles and Calculi 2009-10-22 Paper Models and Proofs of Protocol Security: A Progress Report 2009-06-30...
    10 bytes (17 words) - 00:56, 10 December 2023
  • Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif 2015-05-27 Paper Analyzing security protocols with secrecy types...
    10 bytes (16 words) - 21:36, 22 September 2023
  • of adaptive information security in computer-aided systems 2009-06-30 Paper Modeling of neural-network security tools for computer-aided systems: a formal...
    10 bytes (18 words) - 14:16, 28 January 2024
  • of adaptive information security in computer-aided systems 2009-06-30 Paper Modeling of neural-network security tools for computer-aided systems: a formal...
    10 bytes (18 words) - 14:16, 28 January 2024
  • of adaptive information security in computer-aided systems 2009-06-30 Paper Modeling of neural-network security tools for computer-aided systems: a formal...
    10 bytes (18 words) - 14:16, 28 January 2024
  • Computation for Binary Circuits 2014-08-07 Paper What is computer science? An information security perspective 2014-04-01 Paper Fully homomorphic SIMD operations...
    10 bytes (19 words) - 07:08, 9 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)