default search action
Theoretical Computer Science, Volume 367
Volume 367, Numbers 1-2, November 2006
- Pierpaolo Degano, Luca Viganò:
Preface. 1
- Martín Abadi, Véronique Cortier:
Deciding knowledge in security protocols under equational theories. 2-32 - Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional analysis of contract-signing protocols. 33-56 - Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad:
Formal analysis of Kerberos 5. 57-87 - Carlos Caleiro, Luca Viganò, David A. Basin:
On the semantics of Alice&Bob specifications of security protocols. 88-122 - Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Probable innocence revisited. 123-138 - Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy. 139-161 - Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. 162-202 - Sebastian Nanz, Chris Hankin:
A framework for security analysis of mobile wireless networks. 203-227 - Ramaswamy Ramanujam, S. P. Suresh:
A (restricted) quantifier elimination for security protocols. 228-256 - Graham Steel:
Formal analysis of PIN block attacks. 257-270
Volume 367, Number 3, December 2006
- Grzegorz Rozenberg:
Preface. 271-272
- Yiguang Liu, Zhisheng You, Liping Cao:
A concise functional neural network computing the largest modulus eigenvalues and their corresponding eigenvectors of a real skew matrix. 273-285
- Jiancheng Lv, Zhang Yi, Kok Kiong Tan:
Global convergence of Oja's PCA learning algorithm with a non-zero-approaching adaptive learning rate. 286-307 - Oleg Izmerly, Tal Mor:
Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment. 308-323 - Marco Carpentieri:
A genetic system based on simulated crossover of sequences of two-bit genes. 324-335 - Faisal Shah Khan, Marek A. Perkowski:
Synthesis of multi-qudit hybrid and d-valued quantum logic circuits by decomposition. 336-346
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.