University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Browse by Publication

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 7.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). pp. 317-344.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Ryan, PYA and Schneider, SA (2001) Process Algebra and Non-Interference. Journal of Computer Security, 9 (1/2). pp. 75-103.

This list was generated on Mon Dec 5 08:37:22 2016 GMT.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800