Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security More Books Like This

Computer Security – ESORICS 2007 Computer Security – ESORICS 2007
2007
Foundations of Security Analysis and Design V Foundations of Security Analysis and Design V
2009
Computer Network Security Computer Network Security
2010
Computer Security - ESORICS 2008 Computer Security - ESORICS 2008
2008
Computer Security - ESORICS 2010 Computer Security - ESORICS 2010
2010
Computer Security -- ESORICS 2009 Computer Security -- ESORICS 2009
2009
Foundations and Practice of Security Foundations and Practice of Security
2015
Data and Applications Security and Privacy XXV Data and Applications Security and Privacy XXV
2011
Foundations and Practice of Security Foundations and Practice of Security
2014
Foundations of Security Analysis and Design VI Foundations of Security Analysis and Design VI
2011
Trusted Systems Trusted Systems
2016
Foundations of Security Analysis and Design IV Foundations of Security Analysis and Design IV
2007
Information and Communications Security Information and Communications Security
2010
Data and Applications Security XXI Data and Applications Security XXI
2007
Security Standardisation Research Security Standardisation Research
2016