Author:
Aziz Benjamin,Hamilton Geoff
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference23 articles.
1. Dtoken: a lightweight and traceable delegation architecture for distributed systems;Yang,2009
2. A static analysis of cryptographic processes: the denotational approach;Aziz;Journal of Logic and Algebraic Programming,2005
3. Measuring the speed of information leakage in mobile processes;Aziz,2006
4. The modelling and analysis of PKI-based systems using process calculi;Aziz;International Journal of Foundations of Computer Science,2007
5. B. Aziz, G. Hamilton, Detecting man-in-the-middle attacks by precise timing, in: Proceedings of the the 3rd International Conference on Emerging Security Information, Systems and Technologies, Securware 2009, Athens, Greece, 2009.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Model checking grid security;Future Generation Computer Systems;2013-03
2. Correcting a Delegation Protocol for Grids;Trust, Privacy and Security in Digital Business;2011