01.08.2013 Views

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES 78<br />

Yang:<strong>2012</strong>:GTA<br />

[318] Mu Yang, Vladimiro Sassone, and Sardaouna Hamadou. A game-theoretic<br />

analysis <strong>of</strong> cooperation <strong>in</strong> anonymity networks. Lecture Notes <strong>in</strong> Computer<br />

Science, 7215:269–289, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t),<br />

1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.<br />

1007/978-3-642-28641-4_15/.<br />

Best:<strong>2012</strong>:DSD<br />

[319] Eike Best and Philippe Darondeau. Decid<strong>in</strong>g selective declassification<br />

<strong>of</strong> Petri nets. Lecture Notes <strong>in</strong> Computer Science, 7215:290–308,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-28641-4_16/.<br />

Bas<strong>in</strong>:<strong>2012</strong>:ESP<br />

[320] David Bas<strong>in</strong>, V<strong>in</strong>cent Jugé, and Felix Klaedtke. Enforceable security<br />

policies revisited. Lecture Notes <strong>in</strong> Computer Science, 7215:309–328,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-28641-4_17/.<br />

Milushev:<strong>2012</strong>:TIH<br />

[321] Dimiter Milushev and Dave Clarke. Towards <strong>in</strong>crementalization <strong>of</strong> holistic<br />

hyperproperties. Lecture Notes <strong>in</strong> Computer Science, 7215:329–348,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-28641-4_18/.<br />

Centenaro:<strong>2012</strong>:TBA<br />

[322] Matteo Centenaro, Riccardo Focardi, and Flam<strong>in</strong>ia L. Luccio. Type-based<br />

analysis <strong>of</strong> PKCS#11 key management. Lecture Notes <strong>in</strong> Computer Science,<br />

7215:349–368, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t),<br />

1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.<br />

1007/978-3-642-28641-4_19/.<br />

Amt<strong>of</strong>t:<strong>2012</strong>:CIM<br />

[323] Torben Amt<strong>of</strong>t, Josiah Dodds, Zhi Zhang, and Andrew Appel. A certificate<br />

<strong>in</strong>frastructure for mach<strong>in</strong>e-checked pro<strong>of</strong>s <strong>of</strong> conditional <strong>in</strong>formation<br />

flow. Lecture Notes <strong>in</strong> Computer Science, 7215:369–389, <strong>2012</strong>. CODEN<br />

LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-642-28641-4_20/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!