


default search action
Information and Computation, Volume 238
Volume 238, November 2014
- Steve Kremer, Paliath Narendran:

Foreword to the special issue on security and rewriting techniques. 1 - Benoît Groz, Slawomir Staworko

, Anne-Cécile Caron
, Yves Roos
, Sophie Tison
:
Static analysis of XML security views and query rewriting. 2-29 - Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune:

Modeling and verifying ad hoc routing protocols. 30-67 - Sara Capecchi

, Ilaria Castellani
, Mariangiola Dezani-Ciancaglini
:
Typing access control and secure information flow in sessions. 68-105 - Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune:

Deducibility constraints and blind signatures. 106-127 - Zhiqiang Liu, Christopher Lynch

:
Efficient general AGH-unification. 128-156 - Santiago Escobar

, Catherine Meadows, José Meseguer, Sonia Santiago
:
State space reduction in the Maude-NRL Protocol Analyzer. 157-186 - Clara Bertolissi, Maribel Fernández

:
A metamodel of access control for distributed environments: Applications and properties. 187-207 - Véronique Cortier, Graham Steel:

A generic security API for symmetric key management on cryptographic devices. 208-232 - Max I. Kanovich, Tajana Ban Kirigin

, Vivek Nigam
, Andre Scedrov
:
Bounded memory Dolev-Yao adversaries in collaborative systems. 233-261

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














