TDG Scholar TDGScholar Committed to research! Version 1.7

Bibliography

| Report | Share
A total of 64 records were found in 0.359 seconds
Detecting Compromised Nodes in a Wireless Sensor Network using Trust
SNA, 115-119, 2009
Validating A Layered Decision Framework for Cost-Effective Network Defense
SEKE, 105-110, 2007
Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems
Communication, Network, and Information Security, 13-18, 2006
An MSLS-EMM for enforcing confidentiality in malicious environments
Communication, Network, and Information Security, 126-131, 2006
Performance of Group Key Agreement Protocols over Multiple Operations
IASTED PDCS, 600-606, 2005
Efficient Allocation in Distributed Object Oriented Databases
ISCA PDCS, 471-, 2003
Cryptographic Protocol Engineering-Building Security from the Ground Up
International Conference on Internet Computing, 371-378, 2000
Formal Syntax and Semantics of Java
ISBN: 3-540-66158-11523, 1999
Higher Order Logic Theorem Proving and Its Applications, 8th International Workshop, Aspen Grove, UT, USA, September 11-14, 1995, Proceedings
ISBN: 3-540-60275-5971, 1995
Modelling Non-Deterministic System in HOL
TPHOLs, 295-304, 1992
Mechanical Verification of Secure Distributed Systems in Higher Order Logic
TPHOLs, 263-278, 1991