Volume 2,
Number 1,
November 2003
Volume 2,
Number 2,
January 2004
Volume 2,
Number 3-4,
August 2004
- Corrado Priami:
Preface to the special issue on Security in global computing.
125
Electronic Edition (link) BibTeX
- David Teller, Pascal Zimmer, Daniel Hirschkoff:
Using ambients to control resources.
126-144
Electronic Edition (link) BibTeX
- Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson:
A calculus for control flow analysis of security protocols.
145-167
Electronic Edition (link) BibTeX
- Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci:
Automated analysis of timed security: a case study on web privacy.
168-186
Electronic Edition (link) BibTeX
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari:
Stack inspection and secure program transformations.
187-217
Electronic Edition (link) BibTeX
- Philip D. MacKenzie, Michael K. Reiter:
Two-party generation of DSA signatures.
218-239
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:02:18 2009
by Michael Ley (ley@uni-trier.de)