知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
期刊
ISSN
0304-3975
刊名
Theoretical Computer Science
参考译名
理论计算机科学
收藏年代
2002~2024
全部
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2006, vol.350, no.1
2006, vol.350, no.2-3
2006, vol.351, no.1
2006, vol.351, no.2
2006, vol.351, no.3
2006, vol.352, no.1-3
2006, vol.353, no.1-3
2006, vol.354, no.1
2006, vol.354, no.2
2006, vol.354, no.3
2006, vol.355, no.1
2006, vol.355, no.2
2006, vol.355, no.3
2006, vol.356, no.1-2
2006, vol.356, no.3
2006, vol.357, no.1-3
2006, vol.358, no.1
2006, vol.358, no.2-3
2006, vol.359, no.1-3
2006, vol.360, no.1-3
2006, vol.361, no.1
2006, vol.361, no.2-3
2006, vol.362, no.1-3
2006, vol.363, no.1
2006, vol.363, no.2
2006, vol.363, no.3
2006, vol.364, no.1
2006, vol.364, no.2
2006, vol.364, no.3
2006, vol.365, no.1-2
2006, vol.365, no.3
2006, vol.366, no.1-2
2006, vol.366, no.3
2006, vol.367, no.1-2
2006, vol.367, no.3
2006, vol.368, no.1-2
2006, vol.368, no.3
2006, vol.369, no.1-3
题名
作者
出版年
年卷期
Deciding knowledge in security protocols under equational theories
Martin Abadi; Veronique Cortier
2006
2006, vol.367, no.1-2
Compositional analysis of contract-signing protocols
Michael Backes; Anupam Datta; Ante Derek; John C. Mitchell; Mathieu Turuani
2006
2006, vol.367, no.1-2
Formal analysis of Kerberos 5
Frederick Butler; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Christopher Walstad
2006
2006, vol.367, no.1-2
On the semantics of Alice & Bob specifications of security protocols
Carlos Caleiro; Luca Vigano; David Basin
2006
2006, vol.367, no.1-2
Probable innocence revisited
Konstantinos Chatzikokolakis; Catuscia Palamidessi
2006
2006, vol.367, no.1-2
Injective synchronisation: An extension of the authentication hierarchy
C. J. F. Cremers; S. Mauw; E. P. de Vink
2006
2006, vol.367, no.1-2
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
Santiago Escobar; Catherine Meadows; Jose Meseguer
2006
2006, vol.367, no.1-2
A framework for security analysis of mobile wireless networks
Sebastian Nanz; Chris Hankin
2006
2006, vol.367, no.1-2
A (restricted) quantifier elimination for security protocols
R. Ramanujam; S. P. Suresh
2006
2006, vol.367, no.1-2
Formal analysis of PIN block attacks
Graham Steel
2006
2006, vol.367, no.1-2
制造业外文文献服务平台