Volume 206; Issue 2-4

Information and Computation

Volume 206; Issue 2-4
1

Breaking and fixing public-key Kerberos

Year:
2008
Language:
english
File:
PDF, 1.02 MB
english, 2008
2

Analysis of dynamic policies

Year:
2008
Language:
english
File:
PDF, 329 KB
english, 2008
3

Rule-based static analysis of network protocol implementations

Year:
2008
Language:
english
File:
PDF, 3.27 MB
english, 2008
5

Anonymity protocols as noisy channels

Year:
2008
Language:
english
File:
PDF, 368 KB
english, 2008
6

Hierarchical combination of intruder theories

Year:
2008
Language:
english
File:
PDF, 318 KB
english, 2008
8

On the relationships between models in protocol verification

Year:
2008
Language:
english
File:
PDF, 727 KB
english, 2008
9

Fair multi-party contract signing using private contract signatures

Year:
2008
Language:
english
File:
PDF, 209 KB
english, 2008
10

Preservation of probabilistic information flow under refinement

Year:
2008
Language:
english
File:
PDF, 734 KB
english, 2008
11

Execution monitoring enforcement under memory-limitation constraints

Year:
2008
Language:
english
File:
PDF, 342 KB
english, 2008
12

Authenticating ad hoc networks by comparison of short digests

Year:
2008
Language:
english
File:
PDF, 242 KB
english, 2008
14

Information flow security in Boundary Ambients

Year:
2008
Language:
english
File:
PDF, 1.02 MB
english, 2008
15

Inside Front Cover: Editorial Board

Year:
2008
Language:
english
File:
PDF, 1.42 MB
english, 2008
16

Editorial Board (continued)

Year:
2008
Language:
english
File:
PDF, 1.42 MB
english, 2008