The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
<
Volume 32,
Issue 2
Volume 32,
Issue 1
Volume 31,
Issue 6
Volume 31,
Issue 5
Volume 31,
Issue 4
Volume 31,
Issue 3
Volume 31,
Issue 2
Volume 31,
Issue 1
Volume 30,
Issue 6
Volume 30,
Issue 5
Volume 30,
Issue 4
Volume 30,
Issue 3
Volume 30,
Issue 2
Volume 30,
Issue 1
Volume 29,
Issue 6
Volume 29,
Issue 5
Volume 29,
Issue 4
Volume 29,
Issue 3
Volume 29,
Issue 2
Volume 29,
Issue 1
Volume 28,
Issue 6
Volume 28,
Issue 4
Volume 28,
Issue 3
Volume 28,
Issue 2
Volume 28,
Issue 1
Volume 27,
Issue 4
Volume 27,
Issue 3
Volume 27,
Issue 2
Volume 27,
Issue 1
Volume 26,
Issue 6
Volume 26,
Issue 5
Volume 26,
Issue 4
Volume 26,
Issue 3
Volume 26,
Issue 2
Volume 26,
Issue 1
Volume 25,
Issue 6
Volume 25,
Issue 5
Volume 25,
Issue 4
Volume 25,
Issue 3
Volume 25,
Issue 2
Volume 25,
Issue 1
Volume 24,
Issue 6
Volume 24,
Issue 5
Volume 24,
Issue 4
Volume 24,
Issue 3
Volume 24,
Issue 2
Volume 24,
Issue 1
Volume 23,
Issue 6
Volume 23,
Issue 5
Volume 23,
Issue 4
Volume 23,
Issue 3
Volume 23,
Issue 2
Volume 23,
Issue 1
Volume 22,
Issue 6
Volume 22,
Issue 5
Volume 22,
Issue 4
Volume 22,
Issue 3
Volume 22,
Issue 2
Volume 22,
Issue 1
Volume 21,
Issue 6
Volume 21,
Issue 5
Volume 21,
Issue 4
Volume 21,
Issue 3
Volume 21,
Issue 2
Volume 21,
Issue 1
Volume 20,
Issue 6
Volume 20,
Issue 5
Volume 20,
Issue 4
Volume 20,
Issue 3
Volume 20,
Issue 2
Volume 20,
Issue 1
Volume 19,
Issue 6
Volume 19,
Issue 5
Volume 19,
Issue 4
Volume 19,
Issue 3
Volume 19,
Issue 2
Volume 19,
Issue 1
Volume 18,
Issue 6
Volume 18,
Issue 5
Volume 18,
Issue 4
Volume 18,
Issue 3
Volume 18,
Issue 2
Volume 18,
Issue 1
Volume 17,
Issue 6
Volume 17,
Issue 5
Volume 17,
Issue 4
Volume 17,
Issue 3
Volume 17,
Issue 2
Volume 17,
Issue 1
Volume 16,
Issue 6
Volume 16,
Issue 5
Volume 16,
Issue 4
Volume 16,
Issue 3
Volume 16,
Issue 2
Volume 16,
Issue 1
Volume 15,
Issue 6
Volume 15,
Issue 5
Volume 15,
Issue 4
Volume 15,
Issue 3
Volume 15,
Issue 2
Volume 15,
Issue 1
Volume 14,
Issue 6
Volume 14,
Issue 5
Volume 14,
Issue 4
Volume 14,
Issue 3
Volume 14,
Issue 2
Volume 14,
Issue 1
Volume 13,
Issue 6
Volume 13,
Issue 5
Volume 13,
Issue 4
Volume 13,
Issue 3
Volume 13,
Issue 2
Volume 13,
Issue 1
Volume 12,
Issue 6
Volume 12,
Issue 5
Volume 12,
Issue 4
Volume 12,
Issue 3
Volume 12,
Issue 2
Volume 12,
Issue 1
Volume 11,
Issue 4
Volume 11,
Issue 3
Volume 11,
Issue 2
Volume 11,
Issue 1
Volume 10,
Issue 4
Volume 10,
Issue 3
Volume 10,
Issue 2
Volume 10,
Issue 1
Volume 9,
Issue 4
Volume 9,
Issue 3
Volume 9,
Issue 2
Volume 9,
Issue 1
Volume 8,
Issue 4
Volume 8,
Issue 3
Volume 8,
Issue 2
Volume 8,
Issue 1
Volume 7,
Issue 4
Volume 7,
Issue 3
Volume 7,
Issue 2
Volume 7,
Issue 1
Volume 6,
Issue 4
Volume 6,
Issue 3
Volume 6,
Issue 2
Volume 6,
Issue 1
Volume 5,
Issue 4
Volume 5,
Issue 3
Volume 5,
Issue 2
Volume 5,
Issue 1
Volume 4,
Issue 4
Volume 4,
Issue 3
Volume 4,
Issue 2
Volume 4,
Issue 1
Volume 3,
Issue 4
Volume 3,
Issue 3
Volume 3,
Issue 2
Volume 3,
Issue 1
Volume 2,
Issue 4
Volume 2,
Issue 3
Volume 2,
Issue 2
Volume 2,
Issue 1
Volume 1,
Issue 4
Volume 1,
Issue 3
Volume 1,
Issue 2
Volume 1,
Issue 1
>
Table of contents
495
Preface
Sabelfeld, Andrei
et al.
| 2008
497
Key-dependent message security under active attacks – BRSIM/UC-soundness of Dolev–Yao-style encryption with key cycles
Backes, Michael
/ Pfitzmann, Birgit
/ Scedrov, Andre
et al.
| 2008
531
On the Bayes risk in information-hiding protocols
Chatzikokolakis, Konstantinos
/ Palamidessi, Catuscia
/ Panangaden, Prakash
et al.
| 2008
573
A secure compiler for session abstractions
Corin, Ricardo
/ Deniélou, Pierre-Malo
/ Fournet, Cédric
et al.
| 2008
637
Securing information flow via dynamic capture of dependencies
Shroff, Paritosh
/ Smith, Scott F.
/ Thober, Mark
et al.
| 2008