Volume 12; Issue 3-4

Journal of Computer Security

Volume 12; Issue 3-4
1

Types and effects for asymmetric cryptographic protocols

Year:
2004
Language:
english
File:
PDF, 313 KB
english, 2004
2

Probabilistic analysis of an anonymity system

Year:
2004
Language:
english
File:
PDF, 304 KB
english, 2004
3

Defining information flow quantity

Year:
2004
Language:
english
File:
PDF, 237 KB
english, 2004
4

Embedding agents within the intruder to detect parallel attacks

Year:
2004
Language:
english
File:
PDF, 312 KB
english, 2004
5

Guest editor's preface

Year:
2004
Language:
english
File:
PDF, 33 KB
english, 2004
7

Type-based cryptographic operations*

Year:
2004
Language:
english
File:
PDF, 459 KB
english, 2004
8

Model checking SPKI/SDSI*

Year:
2004
File:
PDF, 331 KB
2004