Personensuche
X
?
Proceedings of the 2nd ACM symposium on Information, computer and communications security ,
11
Specifying and analyzing security automata using CSP-OZ:
, In:
?
Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems ,
12
Securing the distribution and storage of secrets with trust..:
, In:
?
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; Lecture Notes in Computer Science ,
13