- [1]
- G. Allon, T. Raviv, and
R. Y. Rubinstein.
Application of the cross entropy method for buffer allocation problem in
simulation based environment.
In Third International Aegean Conference on the Analysis and Modelling of
Manufacturing Systems, pages 269–278. University of the Aegean, May
2001.
- [2]
- B. Blobel and
F. Roger-France.
A systematic approach for analysis and design of secure health information
systems.
International Journal of Medical Informatics, 62(1):51–78, June
2001.
- [3]
- Van
Burnham and Ralph H. Baer.
Supercade: A Visual History of the Videogame Age, pages 204–208.
MIT Press, 2001.
- [4]
- Zhaohui Cheng.
Formal
analysis of 3g authentication and key agreement protocol.
Technical Report 3GPP TR 33.902, Middlesex University, 2001.
- [5]
- J. Crampton and G. Loizou.
Erratum: A logic of access control (The Computer Journal (2001)
44:1(54–66)).
Computer Journal, 44(2):137–149, 2001.
(doi:10.1093/comjnl/44.2.137)
- [6]
- J. Crampton and G. Loizou.
A logic of access control.
Computer Journal, 44(1):54–66, 2001.
(doi:10.1093/comjnl/44.1.54)
- [7]
- Simon Cross.
How risky is
the internet?.
Online http://www.consult-x.com/papers/internet-risk.htm (current October
2003), February 2001.
- [8]
- Sebastian Fischmeister,
Günther Hagleitner, Wolfgang Pree, and
Gustav Pomberger.
Symbolon—a novel concept for secure e-commerce.
In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government
Conference, pages 603–616. IFIP, Kluwer, October 2001.
- [9]
- S. Fischmeister,
G. Hagleitner, and W. Pree.
Symbolon — a novel concept for secure e-commerce.
1st IFIP Conference on E-Commerce, E-Business, E-Government, I3E
2001, 74:603–616, 2001.
- [10]
- T. Frankewitsch and
U. Prokosch.
Navigation in medical internet image databases.
Medical Informatics and the Internet in Medicine, 26(1):1–15,
March 2001.
(doi:10.1080/14639230010013971)
- [11]
- Dimitris Gritzalis,
Kostantinos Moulinos, John Iliadis,
Costas Lambrinoudakis, and Steven Xarhoulacos.
PyTHIA: towards anonymity in authentication.
In Proceedings of the 16th International Conference on Information
Security: Trusted Information, pages 1–17, 2001.
- [12]
- Stefan Helber.
Cash-flow oriented buffer allocation in stochastic flow lines.
International Journal of Production Research, 39:3061–3083, 2001.
(doi:10.1080/00207540110056144)
- [13]
- H. Pierreval J. L. Paris, L.
Tautou-Guillaume.
Dealing with design options in the optimization of manufacturing systems: an
evolutionary approach.
International Journal of Production Research, 39(6):1081–1091,
April 2001.
(doi:10.1080/00207540010020054)
- [14]
- Neil Johnson and Alan
Mycroft.
Pattern and
approximate-pattern matching for program compaction.
Available online: http://www.cl.cam.ac.uk/users/nej22/patternsurvey.pdf,
February 2001.
- [15]
- J. Jürgens and G. Wimmel.
Security modelling for electronic commerce: The common electronic purse
specifications.
In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government
Conference, pages 489–505. IFIP, Kluwer, October 2001.
- [16]
- Jan
Jürjens.
Smart card: Modelling audit security for smart card payment schemes with
UML-SEC.
In Proceedings of the 16th IFIPSEC 2001 International Conference on
Information Security, pages 93–107. Kluwer Academic Publishers, June
2001.
- [17]
- Nabil El Kadhi.
Analyse statique de programmes en vue de la verification des proprietes
de sécurité cryptographiques.
PhD thesis, Universite de Tunis II, 2001.
In French.
- [18]
- Holger M.
Kienle.
Using SMGN for rapid prototyping of small domain-specific languages.
ACM SIGPLAN Notices, 36(9):64–76, September 2001.
- [19]
- Holger M.
Kienle.
Using SMGN for rapid prototyping of small domain-specific languages.
Journal of Computing and Information Technology, December
2001.
- [20]
- Dimitris
Lekkas.
Trusted Third Parties for Deploying Secure Information Systems.
PhD thesis, Department of Information and Communication Systems, University of
the Aegean, Samos, Greece, December 2001.
- [21]
- R.E.
Link, P.G. Schulam, and L. R. Kavoussi.
Telesurgery — remote monitoring and assistance during laparoscopy.
Urologic Clinics of North America, 28(1):177–187, February
2001.
- [22]
- S.W.
Loke, A. Zaslavsky, B. Yap, and
J. Fonseka.
An itinerary
scripting language for mobile agents in enterprise applications.
In 2nd Asia-Pacific Conference on Intelligent Agent Technology
(IAT-2001), October 2001.
- [23]
- M. Marrotte.
BAN logic for zero-knowledge identification protocols.
In Florida State University CGS 5892 Network Security Conference,
2001.
- [24]
- K. Matusiewicz.
Models and analysis of security in computer networks.
In Proceedings of NEET'2001 New Electronic Technologies and their
Industrial Implementation, 2001.
- [25]
- J. José Neto and A.V.
de Freitas.
Using
adaptive automata in a multi-paradigm programming environment.
In M. H. Hamza, editor, Proceedings of the IASTED
International Conference on Applied Simulation and Modelling ASM 2001.
IASTED, ACTA Press, September 2001.
- [26]
- Y. Papadakis,
V. Chryssikopoulos, and D. Polemi.
Secure medical digital libraries.
International Journal of Medical Informatics, 62(2–3):417–428,
December 2001.
- [27]
- J. L.
Paris, L. Tautou-Guillaume, and H. Pierreval.
Dealing with design options in the optimization of manufacturing systems: an
evolutionary approach.
International Journal of Production Research, 39(6):1081–194,
2001.
- [28]
- Heinz
Pozewaunig.
Mining
Component Behavior to Support Software Retrieval.
PhD thesis, Klagenfurt University, Department of Economic Sciences and
Informatics, Klagenfurt, Germany, 2001.
- [29]
- Erik
Riedel, Mahesh Kallahalla, and Ram
Swaminathan.
A
framework for evaluating storage system security.
Technical Report HPL-SCD-2001-01, Hewlett-Packard Laboratories, Palo Alto, CA,
USA, July 2001.
- [30]
- Kenneth
Russell and Lars Bak.
The
HotSpot serviceability agent: An out-of-process high level debugger for a
Java virtual machine.
In Proceedings of Java Virtual Machine Research and Technology
Symposium. USENIX, USENIX Association, April 2001.
- [31]
- E. Saul and A.C.M.
Hutchison.
An
environment to facilitate the teaching of GNY-based security protocol
analysis techniques.
In Proceedings Second World Conference in Information Security
Education, 2001.
- [32]
- E. Saul and A.C.M.
Hutchison.
Using
Gypsie, Gynger and visual GNY to analyze cryptographic protocols in
Spear II.
In Proceedings Eighth Annual Working Conference on Information Security
Management and Small Systems Security, 2001.
- [33]
- Victoria
Ungureanu.
A
regulated approach to certificate management.
In Proceedings of the 17th Annual Computer Security Applications
Conference. ACSA, December 2001.
- [34]
- Shlomo Wygodny, Dmitry
Barboy, Georgi Prouss, and Anatoly Vorobey.
System
and method for remotely analyzing the execution of computer programs.
United States Patent 6,202,199, March 2001.
Assignee: Mutek Solutions, Ltd. (Or Yehuda, IL).
- [35]
- Shlomo Wygodny, Dmitry
Barboy, Georgi Prouss, and Anatoly Vorobey.
System
and method for monitoring and analyzing the execution of computer
programs.
United States Patent 6,282,701, August 2001.
Assignee: Mutek Solutions, Ltd. (Or Yehuda, IL).
- [36]
- Eric
Yu En Lue.
Intelligent networks
for smart and dumb appliances.
Available online: http://www.yuenlue.com/Literature/INSDA.2a.pdf, September
2001.