Search results for: Bill Roscoe
Lecture Notes in Computer Science > Security in Pervasive Computing > Authentication and Trust > 116-129
Lecture Notes in Computer Science > Security in Pervasive Computing > Session 5: Authentication (III) > 119-133
Lecture Notes in Computer Science > SPIN Model Checking and Software Verification > Tool Tutorials > 322-322
Lecture Notes in Computer Science > Formal Methods and Software Engineering > Verification 2 > 258-277
The International Series in Engineering and Computer Science > Privacy, Security and Trust within the Context of Pervasive Computing > Secure Trust Models and Management in Pervasive Computing > 83-91
Electronic Notes in Theoretical Computer Science > 2005 > 138 > 3 > 61-86