中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
期刊
ISSN
0304-3975
刊名
Theoretical Computer Science
参考译名
理论计算机科学
收藏年代
2002~2024
全部
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2006, vol.350, no.1
2006, vol.350, no.2-3
2006, vol.351, no.1
2006, vol.351, no.2
2006, vol.351, no.3
2006, vol.352, no.1-3
2006, vol.353, no.1-3
2006, vol.354, no.1
2006, vol.354, no.2
2006, vol.354, no.3
2006, vol.355, no.1
2006, vol.355, no.2
2006, vol.355, no.3
2006, vol.356, no.1-2
2006, vol.356, no.3
2006, vol.357, no.1-3
2006, vol.358, no.1
2006, vol.358, no.2-3
2006, vol.359, no.1-3
2006, vol.360, no.1-3
2006, vol.361, no.1
2006, vol.361, no.2-3
2006, vol.362, no.1-3
2006, vol.363, no.1
2006, vol.363, no.2
2006, vol.363, no.3
2006, vol.364, no.1
2006, vol.364, no.2
2006, vol.364, no.3
2006, vol.365, no.1-2
2006, vol.365, no.3
2006, vol.366, no.1-2
2006, vol.366, no.3
2006, vol.367, no.1-2
2006, vol.367, no.3
2006, vol.368, no.1-2
2006, vol.368, no.3
2006, vol.369, no.1-3
题名
作者
出版年
年卷期
Deciding knowledge in security protocols under equational theories
Martin Abadi; Veronique Cortier
2006
2006, vol.367, no.1-2
Compositional analysis of contract-signing protocols
Michael Backes; Anupam Datta; Ante Derek; John C. Mitchell; Mathieu Turuani
2006
2006, vol.367, no.1-2
Formal analysis of Kerberos 5
Frederick Butler; Iliano Cervesato; Aaron D. Jaggard; Andre Scedrov; Christopher Walstad
2006
2006, vol.367, no.1-2
On the semantics of Alice & Bob specifications of security protocols
Carlos Caleiro; Luca Vigano; David Basin
2006
2006, vol.367, no.1-2
Probable innocence revisited
Konstantinos Chatzikokolakis; Catuscia Palamidessi
2006
2006, vol.367, no.1-2
Injective synchronisation: An extension of the authentication hierarchy
C. J. F. Cremers; S. Mauw; E. P. de Vink
2006
2006, vol.367, no.1-2
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
Santiago Escobar; Catherine Meadows; Jose Meseguer
2006
2006, vol.367, no.1-2
A framework for security analysis of mobile wireless networks
Sebastian Nanz; Chris Hankin
2006
2006, vol.367, no.1-2
A (restricted) quantifier elimination for security protocols
R. Ramanujam; S. P. Suresh
2006
2006, vol.367, no.1-2
Formal analysis of PIN block attacks
Graham Steel
2006
2006, vol.367, no.1-2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2024