3

SSL/TLS session-aware user authentication revisited

Year:
2008
Language:
english
File:
PDF, 234 KB
english, 2008
4

Search in games with incomplete information: a case study using Bridge card play

Year:
1998
Language:
english
File:
PDF, 2.65 MB
english, 1998
5

Middle-out reasoning for synthesis and induction

Year:
1996
Language:
english
File:
PDF, 1.55 MB
english, 1996
6

A term equality problem equivalent to graph isomorphism

Year:
1994
Language:
english
File:
PDF, 594 KB
english, 1994
7

Editorial

Year:
2004
Language:
english
File:
PDF, 16 KB
english, 2004
12

A formal data-model of the CORBA security service

Year:
2001
Language:
english
File:
PDF, 75 KB
english, 2001
16

Runtime Verification over Out-of-order Streams

Year:
2019
Language:
english
File:
PDF, 2.35 MB
english, 2019
17

CryptHOL: Game-Based Proofs in Higher-Order Logic

Year:
2020
Language:
english
File:
PDF, 1.35 MB
english, 2020
18

Program Development Schemata as Derived Rules

Year:
2000
Language:
english
File:
PDF, 431 KB
english, 2000
19

A Higher-order Interpretation of Deductive Tableau

Year:
2001
Language:
english
File:
PDF, 325 KB
english, 2001
21

Automated analysis of security-design models

Year:
2009
Language:
english
File:
PDF, 802 KB
english, 2009
22

Developing topology discovery in Event-B

Year:
2009
Language:
english
File:
PDF, 1.06 MB
english, 2009
23

On the semantics of Alice&Bob specifications of security protocols

Year:
2006
Language:
english
File:
PDF, 548 KB
english, 2006
24

A theoretical and empirical investigation of search in imperfect information games

Year:
2001
Language:
english
File:
PDF, 696 KB
english, 2001
26

Scoped Metatheorems

Year:
1998
File:
PDF, 623 KB
1998
28

A calculus for and termination of rippling

Year:
1996
Language:
english
File:
PDF, 1.65 MB
english, 1996
31

Konflikt oder Review zwei Ansätze für Labors in angewandter Informationssicherheit

Year:
2005
Language:
german
File:
PDF, 271 KB
german, 2005
33

Efficient analysis of pattern-based constraint specifications

Year:
2010
Language:
english
File:
PDF, 1.38 MB
english, 2010
35

Formally verified synthesis of combinational CMOS circuits

Year:
1991
Language:
english
File:
PDF, 895 KB
english, 1991
36

Deconstructing Alice and Bob

Year:
2005
Language:
english
File:
PDF, 354 KB
english, 2005
39

Natural Deduction for Non-Classical Logics

Year:
1998
File:
PDF, 2.12 MB
1998
40

Labelled Modal Logics: Quantifiers

Year:
1998
Language:
english
File:
PDF, 208 KB
english, 1998
41

Modeling a Hardware Synthesis Methodology in Isabelle

Year:
1999
Language:
english
File:
PDF, 200 KB
english, 1999
42

Current Trends in Logical Frameworks and Metalanguages

Year:
2001
Language:
english
File:
PDF, 28 KB
english, 2001
44

Applied Information Security Volume 43 || Network Services

Year:
2011
Language:
english
File:
PDF, 250 KB
english, 2011
45

Structuring Metatheory on Inductive Definitions

Year:
2000
Language:
english
File:
PDF, 149 KB
english, 2000
47

[Lecture Notes in Computer Science] Theorem Proving in Higher Order Logics Volume 2758 ||

Year:
2003
Language:
english
File:
PDF, 185 KB
english, 2003
48

Predictable Mobile Routing for Spacecraft Networks

Year:
2013
Language:
english
File:
PDF, 731 KB
english, 2013
49

[Lecture Notes in Computer Science] Principles of Security and Trust Volume 7796 ||

Year:
2013
Language:
english
File:
PDF, 3.66 MB
english, 2013
50

Applied Information Security ||

Year:
2011
Language:
english
File:
PDF, 1.56 MB
english, 2011