{"title":"A Brief History of Security Protocols","authors":"P. Ryan","doi":"10.1007/978-3-319-51046-0_12","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_12","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Gibson-Robinson, Philippa J. Hopcroft, R. Lazic
{"title":"Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday","authors":"Thomas Gibson-Robinson, Philippa J. Hopcroft, R. Lazic","doi":"10.1007/978-3-319-51046-0","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"More Stubborn Set Methods for Process Algebras","authors":"A. Valmari","doi":"10.1007/978-3-319-51046-0_13","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_13","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abstractions for Transition Systems with Applications to Stubborn Sets","authors":"Henri Hansen","doi":"10.1007/978-3-319-51046-0_6","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_6","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"30 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}