University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Browse by Publication

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 8.

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J and Schneider, S (2005) A decision procedure for the existence of a rank function. Journal of Computer Security, 13 (2). 317 - 344. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). 217 - 244. ISSN 0926-227X

Ryan, P. Y. and Schneider, Steve A. (2001) Process algebra and non-interference Journal of Computer Security, 9. pp. 75-103.

Ryan, PYA and Schneider, SA (2001) Process Algebra and Non-Interference. Journal of Computer Security, 9 (1/2). 75 - 103. ISSN 0926-227X

This list was generated on Tue Jul 29 17:50:24 2014 IST.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800