This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Guest Editorial: Introduction to the Special Section
January 1996 (vol. 22 no. 1)
pp. 3-5

[1] M. Abadi and R. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Trans. on Software Engineering, Jan. 1996.
[2] N. Heintze and J.D. Tygar, "A Model for secure protocols and their compositions," IEEE Trans. on Software Engineering, Jan. 1996.
[3] L. Gong and X. Qian, "Computational issues in secure interoperation," IEEE Trans. on Software Engineering, Jan. 1996.
[4] J. McLean, "A general method of composition for a class of possibilistic properties," IEEE Trans. on Software Engineering, Jan. 1996.
[5] M.K. Reiter, "A secure group membership protocol," IEEE Trans. on Software Engineering," Jan. 1996.

Citation:
"Guest Editorial: Introduction to the Special Section," IEEE Transactions on Software Engineering, vol. 22, no. 1, pp. 3-5, Jan. 1996, doi:10.1109/TSE.1996.10000
Usage of this product signifies your acceptance of the Terms of Use.