01.08.2013 Views

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES 75<br />

Bozga:<strong>2012</strong>:DCT<br />

[300] Marius Bozga, Radu Iosif, and Filip Konečn´y. Decid<strong>in</strong>g conditional term<strong>in</strong>ation.<br />

Lecture Notes <strong>in</strong> Computer Science, 7214:252–266, <strong>2012</strong>. CODEN<br />

LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-642-28756-5_18/.<br />

Armando:<strong>2012</strong>:APA<br />

[301] Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta,<br />

and Alberto Calvi. The AVANTSSAR platform for the automated validation<br />

<strong>of</strong> trust and security <strong>of</strong> service-oriented architectures. Lecture Notes<br />

<strong>in</strong> Computer Science, 7214:267–282, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-28756-5_19/.<br />

Wang:<strong>2012</strong>:RBF<br />

[302] Anduo Wang, Carolyn Talcott, Alexander J. T. Gurney, Boon Thau<br />

Loo, and Andre Scedrov. Reduction-based formal analysis <strong>of</strong> BGP <strong>in</strong>stances.<br />

Lecture Notes <strong>in</strong> Computer Science, 7214:283–298, <strong>2012</strong>. CODEN<br />

LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-642-28756-5_20/.<br />

Anonymous:<strong>2012</strong>:FMs<br />

[303] Anonymous. Front matter. Lecture Notes <strong>in</strong> Computer Science, 7214:<br />

??, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/content/pdf/bfm:978-3-<br />

642-28756-5/1.<br />

Dwork:<strong>2012</strong>:DPP<br />

[304] Cynthia Dwork. Differential privacy and the power <strong>of</strong> (formaliz<strong>in</strong>g) negative<br />

th<strong>in</strong>k<strong>in</strong>g. Lecture Notes <strong>in</strong> Computer Science, 7215:1–2, <strong>2012</strong>.<br />

CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/accesspage/chapter/10.1007/978-<br />

3-642-28641-4_1.<br />

Blanchet:<strong>2012</strong>:SPV<br />

[305] Bruno Blanchet. Security protocol verification: Symbolic and computational<br />

models. Lecture Notes <strong>in</strong> Computer Science, 7215:3–29,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-28641-4_2/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!