Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- 02 engineering and technology 63 Treffer
- 0202 electrical engineering, electronic engineering, information engineering 58 Treffer
- computer science 55 Treffer
- 01 natural sciences 50 Treffer
- 0102 computer and information sciences 50 Treffer
-
45 weitere Werte:
- 010201 computation theory & mathematics 50 Treffer
- security protocols 50 Treffer
- theoretical computer science 49 Treffer
- cryptographic protocol 45 Treffer
- [info.info-lo]computer science [cs]/logic in computer science [cs.lo] 39 Treffer
- verification 39 Treffer
- formal methods 38 Treffer
- 020201 artificial intelligence & image processing 33 Treffer
- business 27 Treffer
- business.industry 27 Treffer
- computer 25 Treffer
- computingmilieux_miscellaneous 25 Treffer
- computer.software_genre 24 Treffer
- 16. peace & justice 23 Treffer
- computer science::cryptography and security 23 Treffer
- cryptographic protocols 23 Treffer
- [info]computer science [cs] 21 Treffer
- computer security 21 Treffer
- cryptography 21 Treffer
- 020206 networking & telecommunications 20 Treffer
- cryptographic primitive 19 Treffer
- mathematics 18 Treffer
- decidability 16 Treffer
- 020207 software engineering 14 Treffer
- formal verification 14 Treffer
- general computer science 13 Treffer
- methodes formelles 13 Treffer
- equivalence (measure theory) 12 Treffer
- encryption 11 Treffer
- software 11 Treffer
- symbolic model 11 Treffer
- [info.info-cr] computer science [cs]/cryptography and security [cs.cr] 10 Treffer
- computational theory and mathematics 10 Treffer
- computer science - cryptography and security 10 Treffer
- cryptography and security (cs.cr) 10 Treffer
- equivalence (formal languages) 10 Treffer
- fos: computer and information sciences 10 Treffer
- secrecy 10 Treffer
- securite 10 Treffer
- security 10 Treffer
- 0211 other engineering and technologies 9 Treffer
- 021110 strategic, defence & security studies 9 Treffer
- algebraic properties 9 Treffer
- anonymity 9 Treffer
- composition 9 Treffer
Verlag
- hal ccsd 397 Treffer
- springer 29 Treffer
- elsevier 26 Treffer
- springer verlag 25 Treffer
- ieee 24 Treffer
-
24 weitere Werte:
- association for computing machinery 22 Treffer
- acm 12 Treffer
- ios press 12 Treffer
- springer berlin heidelberg 8 Treffer
- ieee computer society press 4 Treffer
- inria 4 Treffer
- springer science and business media llc 4 Treffer
- acm press 3 Treffer
- association for computing machinery (acm) 3 Treffer
- elsevier inc. 3 Treffer
- logical methods in computer science association 3 Treffer
- publishing association nordic journal of computing 3 Treffer
- arxiv 2 Treffer
- ieee computer society 2 Treffer
- privacy enhancing technologies symposium 2 Treffer
- springer-verlag 2 Treffer
- elsevier bv 1 Treffer
- elsevier science b.v. 1 Treffer
- instytut lacznosci 1 Treffer
- panstwowy instytut badawczy 1 Treffer
- privacy enhancing technologies symposium advisory board 1 Treffer
- schloss dagstuhl - leibniz-zentrum fuer informatik gmbh, wadern/saarbruecken, germany 1 Treffer
- societe pour la science 1 Treffer
- spv 1 Treffer
Publikation
- issn: 1529-3785 18 Treffer
- issn: 0168-7433 14 Treffer
- issn: 0890-5401 13 Treffer
- issn: 1879-2294 11 Treffer
- issn: 0926-227x 9 Treffer
-
18 weitere Werte:
- issn: 0925-9856 7 Treffer
- sp 2020 - 41st ieee symposium on security and privacy ; https://hal.univ-lorraine.fr/hal-02974993 ; sp 2020 - 41st ieee symposium on security and privacy, may 2020, san francisco / virtual, united states. pp.965-982, ⟨10.1109/sp40000.2020.00028⟩ ; https://www.ieee-security.org/tc/sp2020/index.html 4 Treffer
- esorics ; https://hal.science/hal-02390219 ; esorics, pp.385-405, 2018, ⟨10.1007/978-3-319-99073-6_19⟩ 3 Treffer
- information and computation 3 Treffer
- journal of automated reasoning 3 Treffer
- theoretical computer science 3 Treffer
- automata, languages and programming, 33rd international colloquium, {icalp} ; https://hal.science/hal-01759947 ; automata, languages and programming, 33rd international colloquium, {icalp}, jul 2006, venise, italy 2 Treffer
- esorics 2018 - 23rd european symposium on research in computer security ; https://inria.hal.science/hal-01900083 ; esorics 2018 - 23rd european symposium on research in computer security, sep 2018, barcelona, spain 2 Treffer
- issn: 2471-2566 2 Treffer
- 2008 21st ieee computer security foundations symposium 1 Treffer
- 2015 ieee symposium on security and privacy 1 Treffer
- acm transactions on computational logic 1 Treffer
- acm transactions on privacy and security 1 Treffer
- communications of the acm 1 Treffer
- formal methods in system design 1 Treffer
- issn: 0153-4092 1 Treffer
- proceedings of the 2020 acm sigsac conference on computer and communications security 1 Treffer
- proceedings on privacy enhancing technologies 1 Treffer
Sprache
Geographischer Bezug
427 Treffer
-
In: Theoretical Computer Science, Jg. 422 (2012-03-01), S. 15-38Online unknownZugriff:
-
In: Journal of Automated Reasoning, Jg. 48 (2010-09-04), S. 197-217Online unknownZugriff:
-
In: Journal of Automated Reasoning, Jg. 48 (2010-09-01), S. 219-262Online unknownZugriff:
-
In: Journal of Automated Reasoning, Jg. 46 (2010-07-13), S. 225-259Online unknownZugriff:
-
In: ISSN: 1529-3785, 2015academicJournalZugriff:
-
In: CADE'24 - 24th International Conference on Automated Deduction - 2013 ; https://inria.hal.science/hal-00881068 ; CADE'24 - 24th International Conference on Automated Deduction - 2013, Jun 2013, Lake Placid, United States. pp.91-108, ⟨10.1007/978-3-642-38574-2_6⟩, 2013KonferenzZugriff:
-
In: LNCS ; POST 2013 - 2nd Conference on Principles of Security and Trust ; https://hal.inria.fr/hal-00863377 ; POST 2013 - 2nd Conference on Principles of Security and Trust, Mar 2013, Rome, Italy. pp.226-246, ⟨10.1007/978-3-642-36830-1_12⟩, 2013KonferenzZugriff:
-
In: https://theses.hal.science/tel-01277205 ; Cryptography and Security [cs.CR]. Université Paris Saclay (COmUE), 2016. English. ⟨NNT : 2016SACLN008⟩, 2016Online HochschulschriftZugriff:
-
In: Formal Methods in System Design, Jg. 34 (2008-10-30), S. 1-36Online unknownZugriff:
-
In: 2015 IEEE Symposium on Security and Privacy, 2015-05-01Online unknownZugriff:
-
2015Online unknownZugriff:
-
In: 1st International Conference on Principles of Security and Trust (POST'12) ; https://inria.hal.science/hal-00732911 ; 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. pp.30--50, ⟨10.1007/978-3-642-28641-4_3⟩, 2012KonferenzZugriff:
-
In: 1st International Conference on Principles of Security and Trust (POST'12) ; https://inria.hal.science/hal-00732909 ; 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. pp.149--168, ⟨10.1007/978-3-642-28641-4_9⟩, 2012KonferenzZugriff:
-
In: Revised Selected Papers of the 8th Workshop on Security and Trust Management (STM'12) ; https://hal.inria.fr/hal-00863378 ; Revised Selected Papers of the 8th Workshop on Security and Trust Management (STM'12), 2012, Pisa, Italy. pp.257-272, ⟨10.1007/978-3-642-38004-4_17⟩, 2012KonferenzZugriff:
-
In: 2nd Conference on Principles of Security and Trust (POST 2012) ; https://hal.inria.fr/hal-00863380, 2012KonferenzZugriff: