default search action
Information and Computation, Volume 238
Volume 238, November 2014
- Steve Kremer, Paliath Narendran:
Foreword to the special issue on security and rewriting techniques. 1 - Benoît Groz, Slawomir Staworko, Anne-Cécile Caron, Yves Roos, Sophie Tison:
Static analysis of XML security views and query rewriting. 2-29 - Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune:
Modeling and verifying ad hoc routing protocols. 30-67 - Sara Capecchi, Ilaria Castellani, Mariangiola Dezani-Ciancaglini:
Typing access control and secure information flow in sessions. 68-105 - Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune:
Deducibility constraints and blind signatures. 106-127 - Zhiqiang Liu, Christopher Lynch:
Efficient general AGH-unification. 128-156 - Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
State space reduction in the Maude-NRL Protocol Analyzer. 157-186 - Clara Bertolissi, Maribel Fernández:
A metamodel of access control for distributed environments: Applications and properties. 187-207 - Véronique Cortier, Graham Steel:
A generic security API for symmetric key management on cryptographic devices. 208-232 - Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov:
Bounded memory Dolev-Yao adversaries in collaborative systems. 233-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.