The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "STM"( http://dblp.L3S.de/Venues/STM )

URL (DBLP): http://dblp.uni-trier.de/db/conf/stm

Publication years (Num. hits)
2005-2006 (25) 2007-2010 (18) 2011 (17) 2012 (21) 2013 (17) 2014 (18) 2015 (20) 2016 (16) 2017 (17) 2018-2019 (20) 2020-2021 (20) 2022-2023 (22)
Publication types (Num. hits)
inproceedings(215) proceedings(16)
Venues (Conferences, Journals, ...)
STM(231)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 231 publication records. Showing 231 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erisa Karafili, Hanne Riis Nielson, Flemming Nielson How to Trust the Re-use of Data. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrea Pugliese 0001, Antonino Rullo, Antonio Piccolo The AC-Index: Fast Online Detection of Correlated Alerts. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Zimmermann 0002, Claus-Georg Nolte Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anna Lavygina, Alessandra Russo, Naranker Dulay Integrating Privacy and Safety Criteria into Planning Tasks. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sara Foresti (eds.) Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Conrad Williams Obligations in PTaCL. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riccardo De Masellis, Chiara Ghidini, Silvio Ranise A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz A Socio-Technical Investigation into Smartphone Security. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christopher Mann, Daniel Loebenberger Two-Factor Authentication for the Bitcoin Protocol. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Teemu Kanstrén, Antti Evesti Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo It's My Privilege: Controlling Downgrading in DC-Labels. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pankaj Pandey, Steven De Haes Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amr S. Abed, Charles Clancy, David S. Levy Intrusion Detection System for Applications Using Linux Containers. Search on Bibsonomy STM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Filip Jurnecka, Martin Stehlík, Vashek Matyas Evaluation of Key Management Schemes in Wireless Sensor Networks. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Charles Morisset Monotonicity and Completeness in Attribute-Based Access Control. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez ROMEO: ReputatiOn Model Enhancing OpenID Simulator. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza NoPhish: An Anti-Phishing Education App. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Silvio Ranise, Riccardo Traverso ALPS: An Action Language for Policy Specification and Automated Safety Analysis. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sonia Santiago, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vangalur S. Alagar, Kaiyu Wan Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Crampton, James Sellwood Caching and Auditing in the RPPM Model. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino Stateful Usage Control for Android Mobile Devices. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tobias Bamert, Christian Decker 0002, Roger Wattenhofer, Samuel Welten BlueWallet: The Secure Bitcoin Wallet. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paolo Modesti Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aleksandar S. Dimovski Ensuring Secure Non-interference of Programs by Game Semantics. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Christian Damsgaard Jensen (eds.) Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Charles Morisset, Iryna Yevseyeva, Thomas Groß 0001, Aad P. A. van Moorsel A Formal Model for Soft Enforcement: Influencing the Decision-Maker. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Asad Ali 0001, Maribel Fernández Hybrid Enforcement of Category-Based Access Control. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thibaud Antignac, Daniel Le Métayer Privacy Architectures: Reasoning about Data Minimisation and Integrity. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pankaj Pandey, Einar Arthur Snekkenes Using Prediction Markets to Hedge Information Security Risks. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Niklas Grimm, Aniket Kate Lime: Data Lineage in the Malicious Environment. Search on Bibsonomy STM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ryan D. Riley, Chris Clifton, Qutaibah M. Malluhi Maintaining Database Anonymity in the Presence of Queries. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Rocchetto, Luca Viganò 0001, Marco Volpe 0001, Giacomo Dalle Vedove Using Interpolation for the Verification of Security Protocols. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola A Probabilistic Framework for Distributed Localization of Attackers in MANETs. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Botta, Davide Cavagnino, Victor Pomponiu Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Stocker, Frank Böhr IF-Net: A Meta-Model for Security-Oriented Process Specification. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Nicola Dragoni, Sebastiano Gottardo MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nik Sultana, Moritz Y. Becker, Markulf Kohlweiss Selective Disclosure in Datalog-Based Trust Management. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rafael Accorsi, Silvio Ranise (eds.) Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset Probabilistic Cost Enforcement of Security Policies. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas G. Koslowski, Christian Zimmermann 0002 Towards a Detective Approach to Process-Centered Resilience. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lil María Rodríguez-Henríquez, Debrup Chakraborty RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Audun Jøsang, Pierangela Samarati, Marinella Petrocchi (eds.) Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Alisa Pankova New Attacks against Transformation-Based Privacy-Preserving Linear Programming. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Costas Delakouridis, Christos Anagnostopoulos On Enhancement of 'Share The Secret' Scheme for Location Privacy. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis Evaluating the Manageability of Web Browsers Controls. Search on Bibsonomy STM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001, M. Carmen Fernández Gago (eds.) Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Francisco Moyano, M. Carmen Fernández Gago, Javier López 0001 Building Trust and Reputation In: A Development Framework for Trust Models Implementation. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Silvio Ranise, Anh Tuan Truong, Alessandro Armando Boosting Model Checking to Analyse Large ARBAC Policies. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simone Frau, Mohammad Torabi Dashti Analysis of Communicating Authorization Policies. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Valerio Genovese, Deepak Garg 0001, Daniele Rispoli Labeled Goal-Directed Search in Access Control Logic. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Jay Ligatti Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia Authenticating Email Search Results. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bart van Delft, Niklas Broberg, David Sands 0001 A Datalog Semantics for Paralocks. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Stelvio Cimato Constrained Role Mining. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Selwyn Piramuthu A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joep A. de Groot, Vinh T. Bui, Jean-Paul M. G. Linnartz, Johan Lukkien, Richard Verhoeven Software Authentication to Enhance Trust in Body Sensor Networks. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert Künnemann, Graham Steel YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jean-Guillaume Dumas, Hicham Hossayni Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001, Dusko Pavlovic Formalizing Physical Security Procedures. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter Drábik, Fabio Martinelli, Charles Morisset Cost-Aware Runtime Enforcement of Security Policies. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michele Barletta, Silvio Ranise, Luca Viganò 0001 Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Moti Geva, Amir Herzberg DOT-COM: Decentralized Online Trading and COMmerce. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis A Use-Based Approach for Enhancing UCON. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Giulio Caravagna, Gabriele Costa 0001, Giovanni Pardini Lazy Security Controllers. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Meilof Veeningen, Benne de Weger, Nicola Zannone Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy. Search on Bibsonomy STM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Valerio Genovese, Deepak Garg 0001 New Modalities for Access Control Logics: Permission, Control and Ratification. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bjørnar Solhaug, Ketil Stølen Uncertainty, Subjectivity, Trust and Risk: How It All Fits together. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pablo Najera, Rodrigo Roman, Javier López 0001 Secure Architecure for the Integration of RFID and Sensors in Personal Networks. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Audun Jøsang Trust Extortion on the Internet. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ulrich Greveler, Benjamin Justus, Dennis Löhr Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jamie Morgenstern, Deepak Garg 0001, Frank Pfenning A Proof-Carrying File System with Revocable and Use-Once Certificates. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carsten Rudolph Trust Areas: A Security Paradigm for the Future Internet. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Klaus Rechert, Benjamin Greschbach Location Privacy in Relation to Trusted Peers. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephen Marsh 0001, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Henrich Christopher Pöhls, Focke Höhne The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liang Chen, Jason Crampton Risk-Aware Role-Based Access Control. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sascha Müller 0003, Stefan Katzenbeisser 0001 Hiding the Policy in Cryptographic Access Control. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Silvio Ranise Automated Analysis of Infinite State Workflows with Access Control Policies. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Neyire Deniz Sarier Security Notions of Biometric Remote Authentication Revisited. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen Fairness in Non-Repudiation Protocols. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jorge Cuéllar, Gilles Barthe, Alexander Pretschner, Javier López 0001 (eds.) Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Md. Abdul Based, Stig Fr. Mjølsnes Universally Composable NIZK Protocol in an Internet Voting Scheme. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nadim Sarrouh, Florian Eilers, Uwe Nestmann, Ina Schieferdecker Defamation-Free Networks through User-Centered Data Control. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michele Bezzi, Sabrina De Capitani di Vimercati, Giovanni Livraga, Pierangela Samarati Protecting Privacy of Sensitive Value Distributions in Data Release. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ralf Sasse, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Silvio Ranise Automated Symbolic Analysis of ARBAC-Policies. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peter Hartmann, Monika Maidl, David von Oheimb, Richard Robinson A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ioanna Dionysiou, K. Harald Gjermundrød, David E. Bakken GUTS: A Framework for Adaptive and Configureable Grid User Trust Service. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Charles Morisset An Auto-delegation Mechanism for Access Control Systems. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Flavio D. Garcia, Bart Jacobs 0001 Privacy-Friendly Energy-Metering via Homomorphic Encryption. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin Influence of Attribute Freshness on Decision Making in Usage Control. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Simon N. Foley, Wayne Mac Adams, Barry O'Sullivan Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Deepak Garg 0001, Frank Pfenning Stateful Authorization Logic: - Proof Theory and a Case Study. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 231 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license