Volume 64,
Number 1,
July 2005
Practical development of exact real number computation
Volume 64,
Number 2,
August 2005
Modelling and Verification of Cryptographic Protocols
- Roberto M. Amadio:
Guest editor's introduction: Special issue on Modelling and Verification of Cryptographic Protocols.
155
Electronic Edition (link) BibTeX
- Michael Backes:
Unifying simulatability definitions in cryptographic systems under different timing assumptions.
157-188
Electronic Edition (link) BibTeX
- Rohit Chadha, John C. Mitchell, Andre Scedrov, Vitaly Shmatikov:
Contract signing, optimism, and advantage.
189-218
Electronic Edition (link) BibTeX
- Jean Goubault-Larrecq, Muriel Roger, Kumar Neeraj Verma:
Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically.
219-251
Electronic Edition (link) BibTeX
- Neil Evans, Steve A. Schneider:
Verifying security protocols with PVS: widening the rank function approach.
253-284
Electronic Edition (link) BibTeX
- Benjamin Aziz, Geoff W. Hamilton, David Gray:
A static analysis of cryptographic processes: the denotational approach.
285-320
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:10:09 2009
by Michael Ley (ley@uni-trier.de)