Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/secco/secco2004.bht:"
@proceedings{DBLP:conf/secco/2004, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, publisher = {Elsevier}, year = {2005}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/128/issue/5}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secco/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BeekLP05, author = {Maurice H. ter Beek and Gabriele Lenzini and Marinella Petrocchi}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Team Automata for Security: - {A} Survey -}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {105--119}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.044}, doi = {10.1016/J.ENTCS.2004.11.044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BeekLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Bettini05, author = {Lorenzo Bettini}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Data Privacy in Tuple Space Based Mobile Agent Systems}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {3--16}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.038}, doi = {10.1016/J.ENTCS.2004.11.038}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Bettini05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BraghinC05, author = {Chiara Braghin and Agostino Cortesi}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Flow-sensitive Leakage Analysis in Mobile Ambients}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {17--25}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.039}, doi = {10.1016/J.ENTCS.2004.11.039}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BraghinC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BravettiGLZ05, author = {Mario Bravetti and Roberto Gorrieri and Roberto Lucchi and Gianluigi Zavattaro}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {On the Expressiveness of Probabilistic and Prioritized Data-retrieval in Linda}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {39--53}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.041}, doi = {10.1016/J.ENTCS.2004.11.041}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BravettiGLZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/FocardiZ05, author = {Riccardo Focardi and Gianluigi Zavattaro}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Preface}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {1--2}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.037}, doi = {10.1016/J.ENTCS.2004.11.037}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/FocardiZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KremerR05, author = {Steve Kremer and Mark Ryan}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {87--104}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.043}, doi = {10.1016/J.ENTCS.2004.11.043}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/KremerR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Maffei05, author = {Matteo Maffei}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Tags for Multi-Protocol Authentication}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {55--63}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.042}, doi = {10.1016/J.ENTCS.2004.11.042}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Maffei05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/OmiciniRV05, author = {Andrea Omicini and Alessandro Ricci and Mirko Viroli}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {{RBAC} for Organisation and Security in an Agent Coordination Infrastructure}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {65--85}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.045}, doi = {10.1016/J.ENTCS.2004.11.045}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/OmiciniRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/PierroHW05, author = {Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky}, editor = {Riccardo Focardi and Gianluigi Zavattaro}, title = {Continuous-Time Probabilistic {KLAIM}}, booktitle = {Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, SecCo 2004, London, UK, August 30, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {128}, number = {5}, pages = {27--38}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.11.040}, doi = {10.1016/J.ENTCS.2004.11.040}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/PierroHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.