12
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Soft Constraints for Security

      ,   ,
      Electronic Notes in Theoretical Computer Science
      Elsevier BV

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references9

          • Record: found
          • Abstract: not found
          • Article: not found

          Semiring-based constraint satisfaction and optimization

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An attack on the Needham-Schroeder public-key authentication protocol

            Gavin Lowe (1995)
              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              A Comparison of Commercial and Military Computer Security Policies

                Bookmark

                Author and article information

                Journal
                Electronic Notes in Theoretical Computer Science
                Electronic Notes in Theoretical Computer Science
                Elsevier BV
                15710661
                January 2006
                January 2006
                : 142
                :
                : 11-29
                Article
                10.1016/j.entcs.2005.07.011
                36db72ec-fe82-48c3-9d97-932330b29a75
                © 2006

                http://www.elsevier.com/tdm/userlicense/1.0/

                History

                Comments

                Comment on this article