Showing
1 - 8
results of
8
for search '
Mauw, Sjouke
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Mauw, Sjouke
Showing
1 - 8
results of
8
for search '
Mauw, Sjouke
'
, query time: 0.03s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Operational Semantics and Verification of Security Protocols by Cas Cremers, Sjouke Mauw.
by
Cremers, Cas
,
Mauw, Sjouke
Published 2012
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Security and Trust Management 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings edited by Sjouke Mauw, Mauro Conti.
Published 2019
Other Authors:
“…
Mauw, Sjouke
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 3
3
Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings edited by Sjouke Mauw, Christian Damsgaard Jensen.
Published 2014
Other Authors:
“…
Mauw, Sjouke
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers edited by Peng Liu, Sjouke Mauw, Ketil Stolen.
Published 2018
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 5
5
Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia.
Published 2016
Other Authors:
“…
Mauw, Sjouke
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 6
6
CONCUR'99. Concurrency Theory 10th International Conference Eindhoven, The Netherlands, August 24-27, 1999 Proceedings edited by Jos C.M. Baeten, Sjouke Mauw.
Published 1999
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 7
7
Public Key Infrastructure 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings edited by Stig F. Mjølsnes, Sjouke Mauw, Sokratis Katsikas.
Published 2008
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 8
8
Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings edited by Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser.
Published 2016
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Electronic resources (E-books)
Computer security
Application software
Computer programming
Computers
Computers and civilization
Software engineering
Algorithms
Computer logic
Computer organization
Data encryption (Computer science)
E-commerce
Applied mathematics
Architecture, Computer
Artificial intelligence
Computer communication systems
Computer science
Data structures (Computer science)
Engineering mathematics
Information storage and retrieval
Management information systems
Programming languages (Electronic computers)