Search Results - Nonnumerical Algorithms AND Problems—Complexity of proof procedures General Terms Security*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Source: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 12 Issue 2, p20:1-20:34, 34p, 4 Diagrams, 4 Charts

  15. 15
  16. 16

    Source: ACM Transactions on Information & System Security (TISSEC); 2011, Vol. 14 Issue 3, p1-24, 24p

  17. 17
  18. 18
  19. 19
  20. 20