Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
42 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.2 - Network Protocols
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Tools for Parametric Verification. A Comparison on a Case Study
Petr Matoušek
10.3217/jucs-010-10-1469
28-10-2004
Unique: 332 | Total: 393
| Access Period:
1469-1494
HTML
XML
PDF
Research Article
Symbolic Approach to the Analysis of Security Protocols
Stéphane Lafrance
10.3217/jucs-010-09-1156
28-09-2004
Unique: 364 | Total: 440
| Access Period:
1156-1198
HTML
XML
PDF
Research Article
An Information Flow Method to Detect Denial of Service Vulnerabilities
Stéphane Lafrance
,
John Mullins
10.3217/jucs-009-11-1350
28-11-2003
Unique: 328 | Total: 380
| Access Period:
1350-1369
HTML
XML
PDF
Research Article
An Inoteroperability Testing Approach to Wireless Applications Protocols
Ousmane Koné
10.3217/jucs-009-10-1220
28-10-2003
Unique: 317 | Total: 366
| Access Period:
1220-1243
HTML
XML
PDF
Research Article
A Case Study in Verification of UML Statecharts: the PROFIsafe Protocol
Robi Malik
,
Reinhard Mühlfeld
10.3217/jucs-009-02-0138
28-02-2003
Unique: 358 | Total: 440
| Access Period:
138-151
HTML
XML
PDF
Research Article
Formal Analysis of the Kerberos Authentication System
Giampaolo Bella
,
Elvinia Riccobene
10.3217/jucs-003-12-1337
28-12-1997
Unique: 288 | Total: 327
| Access Period:
1337-1381
HTML
XML
PDF
1
2
3
4
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK