Author: Bonatti P.A.
Publisher: Springer Publishing Company
ISSN: 1012-2443
Source: Annals of Mathematics and Artificial Intelligence, Vol.37, Iss.1-2, 2003-01, pp. : 169-235
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Secure Implementation of Channel Abstractions
By Abadi M. Fournet C. Gonthier G.
Information and Computation, Vol. 174, Iss. 1, 2002-04 ,pp. :
An architecture for secure mobile devices
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 10, 2015-07 ,pp. :
Vertex Covers and Secure Domination in Graphs
By Burger Alewyn P. Henning Michael A. van Vuuren Jan H.
Quaestiones Mathematicae, Vol. 31, Iss. 2, 2008-06 ,pp. :
Secure mechanical verification of mutually recursive procedures
Information and Computation, Vol. 187, Iss. 1, 2003-11 ,pp. :
Perfectly Secure Key Distribution for Dynamic Conferences
By Blundo C. de Santis A. Herzberg A. Kutten S. Vaccaro U. Yung M.
Information and Computation, Vol. 146, Iss. 1, 1998-10 ,pp. :