books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Personal
Book Requests
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 12; Issue 3-4
Main
Journal of Computer Security
Volume 12; Issue 3-4
Journal of Computer Security
Volume 12; Issue 3-4
1
Types and effects for asymmetric cryptographic protocols
Gordon, Andrew D.
,
Jeffrey, Alan
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 313 KB
Your tags:
english, 2004
2
Probabilistic analysis of an anonymity system
Shmatikov, Vitaly
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 304 KB
Your tags:
english, 2004
3
Defining information flow quantity
Lowe, Gavin
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 237 KB
Your tags:
english, 2004
4
Embedding agents within the intruder to detect parallel attacks
Broadfoot, P.J.
,
Roscoe, A.W.
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 312 KB
Your tags:
english, 2004
5
Guest editor's preface
Schneider, Steve
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 33 KB
Your tags:
english, 2004
6
Authentication tests and disjoint encryption: A design method for security protocols*
Guttman, Joshua D.
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 217 KB
Your tags:
english, 2004
7
Type-based cryptographic operations*
Duggan, Dominic
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
Language:
english
File:
PDF, 459 KB
Your tags:
english, 2004
8
Model checking SPKI/SDSI*
Jha, S.
,
Reps, T.
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
File:
PDF, 331 KB
Your tags:
2004
9
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Buttyán, Levente
,
Hubaux, Jean-Pierre
,
Äapkun, Srdjan
,
Schneider, S.
Journal:
Journal of Computer Security
Year:
2004
File:
PDF, 307 KB
Your tags:
2004
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×