![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Theoretical Computer Science, Volume 367
Volume 367, Numbers 1-2, November 2006
- Pierpaolo Degano, Luca Viganò:
Preface. 1
- Martín Abadi, Véronique Cortier:
Deciding knowledge in security protocols under equational theories. 2-32 - Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell
, Mathieu Turuani:
Compositional analysis of contract-signing protocols. 33-56 - Frederick Butler, Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Christopher Walstad:
Formal analysis of Kerberos 5. 57-87 - Carlos Caleiro
, Luca Viganò, David A. Basin:
On the semantics of Alice&Bob specifications of security protocols. 88-122 - Konstantinos Chatzikokolakis, Catuscia Palamidessi
:
Probable innocence revisited. 123-138 - Cas J. F. Cremers, Sjouke Mauw
, Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy. 139-161 - Santiago Escobar
, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. 162-202 - Sebastian Nanz, Chris Hankin
:
A framework for security analysis of mobile wireless networks. 203-227 - Ramaswamy Ramanujam, S. P. Suresh:
A (restricted) quantifier elimination for security protocols. 228-256 - Graham Steel:
Formal analysis of PIN block attacks. 257-270
Volume 367, Number 3, December 2006
- Grzegorz Rozenberg:
Preface. 271-272
- Yiguang Liu, Zhisheng You, Liping Cao:
A concise functional neural network computing the largest modulus eigenvalues and their corresponding eigenvectors of a real skew matrix. 273-285
- Jiancheng Lv, Zhang Yi, Kok Kiong Tan:
Global convergence of Oja's PCA learning algorithm with a non-zero-approaching adaptive learning rate. 286-307 - Oleg Izmerly, Tal Mor:
Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment. 308-323 - Marco Carpentieri:
A genetic system based on simulated crossover of sequences of two-bit genes. 324-335 - Faisal Shah Khan
, Marek A. Perkowski:
Synthesis of multi-qudit hybrid and d-valued quantum logic circuits by decomposition. 336-346
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.