Search results for: Catherine Meadows
Lecture Notes in Computer Science > Software Security — Theories and Systems > Authentication Protocols > 339-355
Lecture Notes in Computer Science > Information Assurance in Computer Networks > Invited Talks > 21-21
Lecture Notes in Computer Science > Computer Security - ESORICS 2008 > Session 11: Formal Models and Cryptographic Protocols > 548-562
Lecture Notes in Computer Science > Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security > 2-22
Lecture Notes in Computer Science > Practical Aspects of Declarative Languages > Invited Talks > 1-2
Lecture Notes in Computer Science > Advances in Cryptology > Randomness and Its Concomitants > 242-268
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Information and Computation > 2014 > 238 > Complete > 157-186