Ausgabe 1/2014
Inhalt (7 Artikel)
Original Article
Cryptographic protocols with everyday objects
James Heather, Steve Schneider, Vanessa Teague
Original Article
Verifying anonymity in voting systems using CSP
Murat Moran, James Heather, Steve Schneider
Original Article
Formal verification of security protocol implementations: a survey
Matteo Avalle, Alfredo Pironti, Riccardo Sisto
Original Article
Safe abstractions of data encodings in formal security protocol models
Alfredo Pironti, Riccardo Sisto
Original Article
Abstractions of non-interference security: probabilistic versus possibilistic
T. S. Hoang, A. K. McIver, L. Meinicke, C. C. Morgan, A. Sloane, E. Susatyo