Volume 367,
Numbers 1-2,
November 2006
Automated Reasoning for Security Protocol Analysis,
Automated Reasoning for Security Protocol Analysis
Contributions
- Martín Abadi, Véronique Cortier:
Deciding knowledge in security protocols under equational theories.
2-32
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional analysis of contract-signing protocols.
33-56
- Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad:
Formal analysis of Kerberos 5.
57-87
- Carlos Caleiro, Luca Viganò, David A. Basin:
On the semantics of Alice&Bob specifications of security protocols.
88-122
- Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Probable innocence revisited.
123-138
- Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy.
139-161
- Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
162-202
- Sebastian Nanz, Chris Hankin:
A framework for security analysis of mobile wireless networks.
203-227
- Ramaswamy Ramanujam, S. P. Suresh:
A (restricted) quantifier elimination for security protocols.
228-256
- Graham Steel:
Formal analysis of PIN block attacks.
257-270
Volume 367,
Number 3,
December 2006
Preface
Fundamental study
- Yiguang Liu, Zhisheng You, Liping Cao:
A concise functional neural network computing the largest modulus eigenvalues and their corresponding eigenvectors of a real skew matrix.
273-285
Contributions
- Jiancheng Lv, Zhang Yi, K. K. Tan:
Global convergence of Oja's PCA learning algorithm with a non-zero-approaching adaptive learning rate.
286-307
- Oleg Izmerly, Tal Mor:
Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment.
308-323
- Marco Carpentieri:
A genetic system based on simulated crossover of sequences of two-bit genes.
324-335
- Faisal Shah Khan, Marek A. Perkowski:
Synthesis of multi-qudit hybrid and d-valued quantum logic circuits by decomposition.
336-346
Copyright © Fri Mar 12 17:33:13 2010
by Michael Ley (ley@uni-trier.de)