Search dblp for Publications

export results for "toc:db/journals/iandc/iandc238.bht:"

 download as .bib file

@article{DBLP:journals/iandc/ArnaudCD14,
  author       = {Mathilde Arnaud and
                  V{\'{e}}ronique Cortier and
                  St{\'{e}}phanie Delaune},
  title        = {Modeling and verifying ad hoc routing protocols},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {30--67},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.004},
  doi          = {10.1016/J.IC.2014.07.004},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ArnaudCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BertolissiF14,
  author       = {Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez},
  title        = {A metamodel of access control for distributed environments: Applications
                  and properties},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {187--207},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.009},
  doi          = {10.1016/J.IC.2014.07.009},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/BertolissiF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BursucCD14,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  title        = {Deducibility constraints and blind signatures},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {106--127},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.006},
  doi          = {10.1016/J.IC.2014.07.006},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BursucCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CapecchiCD14,
  author       = {Sara Capecchi and
                  Ilaria Castellani and
                  Mariangiola Dezani{-}Ciancaglini},
  title        = {Typing access control and secure information flow in sessions},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {68--105},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.005},
  doi          = {10.1016/J.IC.2014.07.005},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/CapecchiCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CortierS14,
  author       = {V{\'{e}}ronique Cortier and
                  Graham Steel},
  title        = {A generic security {API} for symmetric key management on cryptographic
                  devices},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {208--232},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.010},
  doi          = {10.1016/J.IC.2014.07.010},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/CortierS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/EscobarMMS14,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  title        = {State space reduction in the Maude-NRL Protocol Analyzer},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {157--186},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.007},
  doi          = {10.1016/J.IC.2014.07.007},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/EscobarMMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/GrozSCRT14,
  author       = {Beno{\^{\i}}t Groz and
                  Slawomir Staworko and
                  Anne{-}C{\'{e}}cile Caron and
                  Yves Roos and
                  Sophie Tison},
  title        = {Static analysis of {XML} security views and query rewriting},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {2--29},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.003},
  doi          = {10.1016/J.IC.2014.07.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/GrozSCRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/KanovichKNS14,
  author       = {Max I. Kanovich and
                  Tajana Ban Kirigin and
                  Vivek Nigam and
                  Andre Scedrov},
  title        = {Bounded memory Dolev-Yao adversaries in collaborative systems},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {233--261},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.011},
  doi          = {10.1016/J.IC.2014.07.011},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/KanovichKNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/KremerN14,
  author       = {Steve Kremer and
                  Paliath Narendran},
  title        = {Foreword to the special issue on security and rewriting techniques},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.002},
  doi          = {10.1016/J.IC.2014.07.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/KremerN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/LiuL14,
  author       = {Zhiqiang Liu and
                  Christopher Lynch},
  title        = {Efficient general AGH-unification},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {128--156},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.008},
  doi          = {10.1016/J.IC.2014.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/LiuL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics