


default search action
Journal of Computer Security, Volume 6
Volume 6, Number 1-2, 1998
- Martín Abadi:

On SDSI's Linked Local Name Spaces. 3-22 - James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui:

Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications. 23-52 - Gavin Lowe:

Casper: A Compiler for the Analysis of Security Protocols. 53-84 - Lawrence C. Paulson:

The Inductive Approach to Verifying Cryptographic Protocols. 85-128
Volume 6, Number 3, 1998
- Tsutomu Matsumoto:

Human-Computer Cryptography: An Attempt. 129-150 - Steven A. Hofmeyr, Stephanie Forrest

, Anil Somayaji:
Intrusion Detection Using Sequences of System Calls. 151-180 - Indrakshi Ray, Paul Ammann, Sushil Jajodia:

A Semantic-Based Transaction Processing Model for Multilevel Transactions. 181-217
Volume 6, Number 4, 1998
- Lars R. Knudsen, Keith M. Martin:

In Search of Multiple Domain Key Recovery. 219-236 - Matthew K. Franklin, Dahlia Malkhi:

Auditable Metering with Lightweight Security. 237-256 - Fabio Casati, Silvana Castano, Maria Grazia Fugini:

Enforcing Workflow Authorization Constraints Using Triggers. 257-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














