

Period of time: 2001年1-2期
Publisher: Ios Press
Founded in: 1992
Total resources: 3
ISSN: 0926-227X
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Journal of Computer Security,volume 9,issue 1-2
Menu



Athena: a novel approach to efficient automatic security protocol analysis
Journal of Computer Security,volume 9,issue 1-2 , Vol. 9, Iss. 1-2, 2001-01 , pp.
Process algebra and non-interference
Journal of Computer Security,volume 9,issue 1-2 , Vol. 9, Iss. 1-2, 2001-01 , pp.
A logic for SDSI's linked local name spaces
Journal of Computer Security,volume 9,issue 1-2 , Vol. 9, Iss. 1-2, 2001-01 , pp.
A cost-based framework for analysis of denial of service in networks
Journal of Computer Security,volume 9,issue 1-2 , Vol. 9, Iss. 1-2, 2001-01 , pp.