Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iandc/iandc238.bht:"
@article{DBLP:journals/iandc/ArnaudCD14, author = {Mathilde Arnaud and V{\'{e}}ronique Cortier and St{\'{e}}phanie Delaune}, title = {Modeling and verifying ad hoc routing protocols}, journal = {Inf. Comput.}, volume = {238}, pages = {30--67}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.004}, doi = {10.1016/J.IC.2014.07.004}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ArnaudCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BertolissiF14, author = {Clara Bertolissi and Maribel Fern{\'{a}}ndez}, title = {A metamodel of access control for distributed environments: Applications and properties}, journal = {Inf. Comput.}, volume = {238}, pages = {187--207}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.009}, doi = {10.1016/J.IC.2014.07.009}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BertolissiF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BursucCD14, author = {Sergiu Bursuc and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, title = {Deducibility constraints and blind signatures}, journal = {Inf. Comput.}, volume = {238}, pages = {106--127}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.006}, doi = {10.1016/J.IC.2014.07.006}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BursucCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CapecchiCD14, author = {Sara Capecchi and Ilaria Castellani and Mariangiola Dezani{-}Ciancaglini}, title = {Typing access control and secure information flow in sessions}, journal = {Inf. Comput.}, volume = {238}, pages = {68--105}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.005}, doi = {10.1016/J.IC.2014.07.005}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/CapecchiCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CortierS14, author = {V{\'{e}}ronique Cortier and Graham Steel}, title = {A generic security {API} for symmetric key management on cryptographic devices}, journal = {Inf. Comput.}, volume = {238}, pages = {208--232}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.010}, doi = {10.1016/J.IC.2014.07.010}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/CortierS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/EscobarMMS14, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, title = {State space reduction in the Maude-NRL Protocol Analyzer}, journal = {Inf. Comput.}, volume = {238}, pages = {157--186}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.007}, doi = {10.1016/J.IC.2014.07.007}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/EscobarMMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/GrozSCRT14, author = {Beno{\^{\i}}t Groz and Slawomir Staworko and Anne{-}C{\'{e}}cile Caron and Yves Roos and Sophie Tison}, title = {Static analysis of {XML} security views and query rewriting}, journal = {Inf. Comput.}, volume = {238}, pages = {2--29}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.003}, doi = {10.1016/J.IC.2014.07.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/GrozSCRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/KanovichKNS14, author = {Max I. Kanovich and Tajana Ban Kirigin and Vivek Nigam and Andre Scedrov}, title = {Bounded memory Dolev-Yao adversaries in collaborative systems}, journal = {Inf. Comput.}, volume = {238}, pages = {233--261}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.011}, doi = {10.1016/J.IC.2014.07.011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/KanovichKNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/KremerN14, author = {Steve Kremer and Paliath Narendran}, title = {Foreword to the special issue on security and rewriting techniques}, journal = {Inf. Comput.}, volume = {238}, pages = {1}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.002}, doi = {10.1016/J.IC.2014.07.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/KremerN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/LiuL14, author = {Zhiqiang Liu and Christopher Lynch}, title = {Efficient general AGH-unification}, journal = {Inf. Comput.}, volume = {238}, pages = {128--156}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.008}, doi = {10.1016/J.IC.2014.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/LiuL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.