


default search action
FOSAD 2001/2002
- Riccardo Focardi, Roberto Gorrieri:
Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures. Lecture Notes in Computer Science 2946, Springer 2004, ISBN 3-540-20955-7 - Alessandro Aldini
, Mario Bravetti, Alessandra Di Pierro
, Roberto Gorrieri
, Chris Hankin
, Herbert Wiklicky:
Two Formal Approaches for Approximating Noninterference Properties. 1-43 - Carlo Blundo, Paolo D'Arco:
The Key Establishment Problem. 44-90 - Michele Bugliesi
, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone:
A Survey of Name-Passing Calculi and Crypto-Primitives. 91-138 - Riccardo Focardi, Roberto Gorrieri
, Fabio Martinelli:
Classification of Security Properties - Part II: Network Security. 139-185 - Rosario Gennaro:
Cryptographic Algorithms for Multimedia Traffic. 186-206 - Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz:
Security for Mobility. 207-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.