Found: 2
Select item for more details and to access through your institution.
Security policies enforcement using finite and pushdown edit automata.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 4, p. 319, doi. 10.1007/s10207-013-0195-8
- By:
- Publication type:
- Article
Polytime model checking for timed probabilistic computation tree logic.
- Published in:
- Acta Informatica, 1998, v. 35, n. 8, p. 645, doi. 10.1007/s002360050136
- By:
- Publication type:
- Article