Sciweavers

14824 search results - page 68 / 2965
» Security - Introduction
Sort
View
FOSAD
2000
Springer
15 years 6 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
OOPSLA
2000
Springer
15 years 6 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
OOPSLA
2000
Springer
15 years 6 months ago
Sealed calls in Java packages
Ayal Zaks, Vitaly Feldman, Nava Aizikowitz