


default search action
Foundations and Trends in Privacy and Security, Volume 1
Volume 1, Numbers 1-2, 2016
- Bruno Blanchet
:
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif. 1-135
Volume 1, Number 3, 2017
- Gang Tan:
Principles and Implementation Techniques of Software-Based Fault Isolation. 137-198
Volume 1, Number 4, 2017
- Konstantinos Chatzikokolakis, Ehab ElSalamouny, Catuscia Palamidessi, Anna Pazii:
Methods for Location Privacy: A comparative overview. 199-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.