Works matching IS 16112776 AND DT 2014 AND VI 56 AND IP 6
Results: 12
On the insecurity of XML Security.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 313, doi. 10.1515/itit-2014-1045
- By:
- Publication type:
- Article
Information flow control for workflow management systems.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 294, doi. 10.1515/itit-2014-1055
- By:
- Publication type:
- Article
Designing networks for challenging applications.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 307, doi. 10.1515/itit-2014-1056
- By:
- Publication type:
- Article
Theory for processing data on the Web.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 310, doi. 10.1515/itit-2014-1057
- By:
- Publication type:
- Article
Making security type systems less ad hoc.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 267, doi. 10.1515/itit-2014-1060
- By:
- Publication type:
- Article
Checking probabilistic noninterference using JOANA.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 280, doi. 10.1515/itit-2014-1051
- By:
- Publication type:
- Article
The linear-hyper-branching spectrum of temporal logics.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 273, doi. 10.1515/itit-2014-1067
- By:
- Publication type:
- Article
Confidentiality for Android apps: Specification and verification.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 288, doi. 10.1515/itit-2014-1068
- By:
- Publication type:
- Article
Reliably secure software systems.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 265, doi. 10.1515/itit-2014-1079
- By:
- Publication type:
- Article
Frontmatter.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. i, doi. 10.1515/itit-2014-frontmatter6
- Publication type:
- Article
Security in e-voting.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 300, doi. 10.1515/itit-2014-1062
- By:
- Publication type:
- Article
Checking probabilistic noninterference using JOANA.
- Published in:
- IT: Information Technology, 2014, v. 56, n. 6, p. 280, doi. 10.1515/itit-2014-1051
- By:
- Publication type:
- Article