期刊


ISSN0304-3975
刊名Theoretical Computer Science
参考译名理论计算机科学
收藏年代2002~2024



全部

2002 2003 2004 2005 2006 2007
2008 2009 2010 2011 2012 2013
2014 2015 2016 2017 2018 2019
2020 2021 2022 2023 2024

2006, vol.350, no.1 2006, vol.350, no.2-3 2006, vol.351, no.1 2006, vol.351, no.2 2006, vol.351, no.3 2006, vol.352, no.1-3
2006, vol.353, no.1-3 2006, vol.354, no.1 2006, vol.354, no.2 2006, vol.354, no.3 2006, vol.355, no.1 2006, vol.355, no.2
2006, vol.355, no.3 2006, vol.356, no.1-2 2006, vol.356, no.3 2006, vol.357, no.1-3 2006, vol.358, no.1 2006, vol.358, no.2-3
2006, vol.359, no.1-3 2006, vol.360, no.1-3 2006, vol.361, no.1 2006, vol.361, no.2-3 2006, vol.362, no.1-3 2006, vol.363, no.1
2006, vol.363, no.2 2006, vol.363, no.3 2006, vol.364, no.1 2006, vol.364, no.2 2006, vol.364, no.3 2006, vol.365, no.1-2
2006, vol.365, no.3 2006, vol.366, no.1-2 2006, vol.366, no.3 2006, vol.367, no.1-2 2006, vol.367, no.3 2006, vol.368, no.1-2
2006, vol.368, no.3 2006, vol.369, no.1-3

题名作者出版年年卷期
Deciding knowledge in security protocols under equational theoriesMartin Abadi; Veronique Cortier20062006, vol.367, no.1-2
Compositional analysis of contract-signing protocolsMichael Backes; Anupam Datta; Ante Derek; John C. Mitchell; Mathieu Turuani20062006, vol.367, no.1-2
Formal analysis of Kerberos 5Frederick Butler; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Christopher Walstad20062006, vol.367, no.1-2
On the semantics of Alice & Bob specifications of security protocolsCarlos Caleiro; Luca Vigano; David Basin20062006, vol.367, no.1-2
Probable innocence revisitedKonstantinos Chatzikokolakis; Catuscia Palamidessi20062006, vol.367, no.1-2
Injective synchronisation: An extension of the authentication hierarchyC. J. F. Cremers; S. Mauw; E. P. de Vink20062006, vol.367, no.1-2
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical propertiesSantiago Escobar; Catherine Meadows; Jose Meseguer20062006, vol.367, no.1-2
A framework for security analysis of mobile wireless networksSebastian Nanz; Chris Hankin20062006, vol.367, no.1-2
A (restricted) quantifier elimination for security protocolsR. Ramanujam; S. P. Suresh20062006, vol.367, no.1-2
Formal analysis of PIN block attacksGraham Steel20062006, vol.367, no.1-2