[1]
G. Allon, T. Raviv, and R. Y. Rubinstein. Application of the cross entropy method for buffer allocation problem in simulation based environment. In Third International Aegean Conference on the Analysis and Modelling of Manufacturing Systems, pages 269–278. University of the Aegean, May 2001.
[2]
B. Blobel and F. Roger-France. A systematic approach for analysis and design of secure health information systems. International Journal of Medical Informatics, 62(1):51–78, June 2001.
[3]
Van Burnham and Ralph H. Baer. Supercade: A Visual History of the Videogame Age, pages 204–208. MIT Press, 2001.
[4]
Zhaohui Cheng. Formal analysis of 3g authentication and key agreement protocol. Technical Report 3GPP TR 33.902, Middlesex University, 2001.
[5]
J. Crampton and G. Loizou. Erratum: A logic of access control (The Computer Journal (2001) 44:1(54–66)). Computer Journal, 44(2):137–149, 2001. (doi:10.1093/comjnl/44.2.137)
[6]
J. Crampton and G. Loizou. A logic of access control. Computer Journal, 44(1):54–66, 2001. (doi:10.1093/comjnl/44.1.54)
[7]
Simon Cross. How risky is the internet?. Online http://www.consult-x.com/papers/internet-risk.htm (current October 2003), February 2001.
[8]
Sebastian Fischmeister, Günther Hagleitner, Wolfgang Pree, and Gustav Pomberger. Symbolon—a novel concept for secure e-commerce. In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government Conference, pages 603–616. IFIP, Kluwer, October 2001.
[9]
S. Fischmeister, G. Hagleitner, and W. Pree. Symbolon — a novel concept for secure e-commerce. 1st IFIP Conference on E-Commerce, E-Business, E-Government, I3E 2001, 74:603–616, 2001.
[10]
T. Frankewitsch and U. Prokosch. Navigation in medical internet image databases. Medical Informatics and the Internet in Medicine, 26(1):1–15, March 2001. (doi:10.1080/14639230010013971)
[11]
Dimitris Gritzalis, Kostantinos Moulinos, John Iliadis, Costas Lambrinoudakis, and Steven Xarhoulacos. PyTHIA: towards anonymity in authentication. In Proceedings of the 16th International Conference on Information Security: Trusted Information, pages 1–17, 2001.
[12]
Stefan Helber. Cash-flow oriented buffer allocation in stochastic flow lines. International Journal of Production Research, 39:3061–3083, 2001. (doi:10.1080/00207540110056144)
[13]
H. Pierreval J. L. Paris, L. Tautou-Guillaume. Dealing with design options in the optimization of manufacturing systems: an evolutionary approach. International Journal of Production Research, 39(6):1081–1091, April 2001. (doi:10.1080/00207540010020054)
[14]
Neil Johnson and Alan Mycroft. Pattern and approximate-pattern matching for program compaction. Available online: http://www.cl.cam.ac.uk/users/nej22/patternsurvey.pdf, February 2001.
[15]
J. Jürgens and G. Wimmel. Security modelling for electronic commerce: The common electronic purse specifications. In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government Conference, pages 489–505. IFIP, Kluwer, October 2001.
[16]
Jan Jürjens. Smart card: Modelling audit security for smart card payment schemes with UML-SEC. In Proceedings of the 16th IFIPSEC 2001 International Conference on Information Security, pages 93–107. Kluwer Academic Publishers, June 2001.
[17]
Nabil El Kadhi. Analyse statique de programmes en vue de la verification des proprietes de sécurité cryptographiques. PhD thesis, Universite de Tunis II, 2001. In French.
[18]
Holger M. Kienle. Using SMGN for rapid prototyping of small domain-specific languages. ACM SIGPLAN Notices, 36(9):64–76, September 2001.
[19]
Holger M. Kienle. Using SMGN for rapid prototyping of small domain-specific languages. Journal of Computing and Information Technology, December 2001.
[20]
Dimitris Lekkas. Trusted Third Parties for Deploying Secure Information Systems. PhD thesis, Department of Information and Communication Systems, University of the Aegean, Samos, Greece, December 2001.
[21]
R.E. Link, P.G. Schulam, and L. R. Kavoussi. Telesurgery — remote monitoring and assistance during laparoscopy. Urologic Clinics of North America, 28(1):177–187, February 2001.
[22]
S.W. Loke, A. Zaslavsky, B. Yap, and J. Fonseka. An itinerary scripting language for mobile agents in enterprise applications. In 2nd Asia-Pacific Conference on Intelligent Agent Technology (IAT-2001), October 2001.
[23]
M. Marrotte. BAN logic for zero-knowledge identification protocols. In Florida State University CGS 5892 Network Security Conference, 2001.
[24]
K. Matusiewicz. Models and analysis of security in computer networks. In Proceedings of NEET'2001 New Electronic Technologies and their Industrial Implementation, 2001.
[25]
J. José Neto and A.V. de Freitas. Using adaptive automata in a multi-paradigm programming environment. In M. H. Hamza, editor, Proceedings of the IASTED International Conference on Applied Simulation and Modelling ASM 2001. IASTED, ACTA Press, September 2001.
[26]
Y. Papadakis, V. Chryssikopoulos, and D. Polemi. Secure medical digital libraries. International Journal of Medical Informatics, 62(2–3):417–428, December 2001.
[27]
J. L. Paris, L. Tautou-Guillaume, and H. Pierreval. Dealing with design options in the optimization of manufacturing systems: an evolutionary approach. International Journal of Production Research, 39(6):1081–194, 2001.
[28]
Heinz Pozewaunig. Mining Component Behavior to Support Software Retrieval. PhD thesis, Klagenfurt University, Department of Economic Sciences and Informatics, Klagenfurt, Germany, 2001.
[29]
Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan. A framework for evaluating storage system security. Technical Report HPL-SCD-2001-01, Hewlett-Packard Laboratories, Palo Alto, CA, USA, July 2001.
[30]
Kenneth Russell and Lars Bak. The HotSpot serviceability agent: An out-of-process high level debugger for a Java virtual machine. In Proceedings of Java Virtual Machine Research and Technology Symposium. USENIX, USENIX Association, April 2001.
[31]
E. Saul and A.C.M. Hutchison. An environment to facilitate the teaching of GNY-based security protocol analysis techniques. In Proceedings Second World Conference in Information Security Education, 2001.
[32]
E. Saul and A.C.M. Hutchison. Using Gypsie, Gynger and visual GNY to analyze cryptographic protocols in Spear II. In Proceedings Eighth Annual Working Conference on Information Security Management and Small Systems Security, 2001.
[33]
Victoria Ungureanu. A regulated approach to certificate management. In Proceedings of the 17th Annual Computer Security Applications Conference. ACSA, December 2001.
[34]
Shlomo Wygodny, Dmitry Barboy, Georgi Prouss, and Anatoly Vorobey. System and method for remotely analyzing the execution of computer programs. United States Patent 6,202,199, March 2001. Assignee: Mutek Solutions, Ltd. (Or Yehuda, IL).
[35]
Shlomo Wygodny, Dmitry Barboy, Georgi Prouss, and Anatoly Vorobey. System and method for monitoring and analyzing the execution of computer programs. United States Patent 6,282,701, August 2001. Assignee: Mutek Solutions, Ltd. (Or Yehuda, IL).
[36]
Eric Yu En Lue. Intelligent networks for smart and dumb appliances. Available online: http://www.yuenlue.com/Literature/INSDA.2a.pdf, September 2001.
[1]
G. Allon, T. Raviv, and R. Y. Rubinstein. Application of the cross entropy method for buffer allocation problem in simulation based environment. In Third International Aegean Conference on the Analysis and Modelling of Manufacturing Systems, pages 269–278. University of the Aegean, May 2001.

[2]
B. Blobel and F. Roger-France. A systematic approach for analysis and design of secure health information systems. International Journal of Medical Informatics, 62(1):51–78, June 2001.

[3]
Van Burnham and Ralph H. Baer. Supercade: A Visual History of the Videogame Age, pages 204–208. MIT Press, 2001.

[4]
Zhaohui Cheng. Formal analysis of 3g authentication and key agreement protocol. Technical Report 3GPP TR 33.902, Middlesex University, 2001.

[5]
J. Crampton and G. Loizou. Erratum: A logic of access control (The Computer Journal (2001) 44:1(54–66)). Computer Journal, 44(2):137–149, 2001. (doi:10.1093/comjnl/44.2.137)

[6]
J. Crampton and G. Loizou. A logic of access control. Computer Journal, 44(1):54–66, 2001. (doi:10.1093/comjnl/44.1.54)

[7]
Simon Cross. How risky is the internet?. Online http://www.consult-x.com/papers/internet-risk.htm (current October 2003), February 2001.

[8]
S. Fischmeister, G. Hagleitner, and W. Pree. Symbolon — a novel concept for secure e-commerce. 1st IFIP Conference on E-Commerce, E-Business, E-Government, I3E 2001, 74:603–616, 2001.

[9]
Sebastian Fischmeister, Günther Hagleitner, Wolfgang Pree, and Gustav Pomberger. Symbolon—a novel concept for secure e-commerce. In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government Conference, pages 603–616. IFIP, Kluwer, October 2001.

[10]
T. Frankewitsch and U. Prokosch. Navigation in medical internet image databases. Medical Informatics and the Internet in Medicine, 26(1):1–15, March 2001. (doi:10.1080/14639230010013971)

[11]
Dimitris Gritzalis, Kostantinos Moulinos, John Iliadis, Costas Lambrinoudakis, and Steven Xarhoulacos. PyTHIA: towards anonymity in authentication. In Proceedings of the 16th International Conference on Information Security: Trusted Information, pages 1–17, 2001.

[12]
Stefan Helber. Cash-flow oriented buffer allocation in stochastic flow lines. International Journal of Production Research, 39:3061–3083, 2001. (doi:10.1080/00207540110056144)

[13]
H. Pierreval J. L. Paris, L. Tautou-Guillaume. Dealing with design options in the optimization of manufacturing systems: an evolutionary approach. International Journal of Production Research, 39(6):1081–1091, April 2001. (doi:10.1080/00207540010020054)

[14]
Neil Johnson and Alan Mycroft. Pattern and approximate-pattern matching for program compaction. Available online: http://www.cl.cam.ac.uk/users/nej22/patternsurvey.pdf, February 2001.

[15]
J. Jürgens and G. Wimmel. Security modelling for electronic commerce: The common electronic purse specifications. In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government Conference, pages 489–505. IFIP, Kluwer, October 2001.

[16]
Jan Jürjens. Smart card: Modelling audit security for smart card payment schemes with UML-SEC. In Proceedings of the 16th IFIPSEC 2001 International Conference on Information Security, pages 93–107. Kluwer Academic Publishers, June 2001.

[17]
Nabil El Kadhi. Analyse statique de programmes en vue de la verification des proprietes de sécurité cryptographiques. PhD thesis, Universite de Tunis II, 2001. In French.

[18]
Holger M. Kienle. Using SMGN for rapid prototyping of small domain-specific languages. ACM SIGPLAN Notices, 36(9):64–76, September 2001.

[19]
Holger M. Kienle. Using SMGN for rapid prototyping of small domain-specific languages. Journal of Computing and Information Technology, December 2001.

[20]
Dimitris Lekkas. Trusted Third Parties for Deploying Secure Information Systems. PhD thesis, Department of Information and Communication Systems, University of the Aegean, Samos, Greece, December 2001.

[21]
R.E. Link, P.G. Schulam, and L. R. Kavoussi. Telesurgery — remote monitoring and assistance during laparoscopy. Urologic Clinics of North America, 28(1):177–187, February 2001.

[22]
S.W. Loke, A. Zaslavsky, B. Yap, and J. Fonseka. An itinerary scripting language for mobile agents in enterprise applications. In 2nd Asia-Pacific Conference on Intelligent Agent Technology (IAT-2001), October 2001.

[23]
M. Marrotte. BAN logic for zero-knowledge identification protocols. In Florida State University CGS 5892 Network Security Conference, 2001.

[24]
K. Matusiewicz. Models and analysis of security in computer networks. In Proceedings of NEET'2001 New Electronic Technologies and their Industrial Implementation, 2001.

[25]
J. José Neto and A.V. de Freitas. Using adaptive automata in a multi-paradigm programming environment. In M. H. Hamza, editor, Proceedings of the IASTED International Conference on Applied Simulation and Modelling ASM 2001. IASTED, ACTA Press, September 2001.

[26]
Y. Papadakis, V. Chryssikopoulos, and D. Polemi. Secure medical digital libraries. International Journal of Medical Informatics, 62(2–3):417–428, December 2001.

[27]
J. L. Paris, L. Tautou-Guillaume, and H. Pierreval. Dealing with design options in the optimization of manufacturing systems: an evolutionary approach. International Journal of Production Research, 39(6):1081–194, 2001.

[28]
Heinz Pozewaunig. Mining Component Behavior to Support Software Retrieval. PhD thesis, Klagenfurt University, Department of Economic Sciences and Informatics, Klagenfurt, Germany, 2001.

[29]
Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan. A framework for evaluating storage system security. Technical Report HPL-SCD-2001-01, Hewlett-Packard Laboratories, Palo Alto, CA, USA, July 2001.

[30]
Kenneth Russell and Lars Bak. The HotSpot serviceability agent: An out-of-process high level debugger for a Java virtual machine. In Proceedings of Java Virtual Machine Research and Technology Symposium. USENIX, USENIX Association, April 2001.

[31]
E. Saul and A.C.M. Hutchison. An environment to facilitate the teaching of GNY-based security protocol analysis techniques. In Proceedings Second World Conference in Information Security Education, 2001.

[32]
E. Saul and A.C.M. Hutchison. Using Gypsie, Gynger and visual GNY to analyze cryptographic protocols in Spear II. In Proceedings Eighth Annual Working Conference on Information Security Management and Small Systems Security, 2001.

[33]
Victoria Ungureanu. A regulated approach to certificate management. In Proceedings of the 17th Annual Computer Security Applications Conference. ACSA, December 2001.

[34]
Shlomo Wygodny, Dmitry Barboy, Georgi Prouss, and Anatoly Vorobey. System and method for monitoring and analyzing the execution of computer programs. United States Patent 6,282,701, August 2001. Assignee: Mutek Solutions, Ltd. (Or Yehuda, IL).

[35]
Shlomo Wygodny, Dmitry Barboy, Georgi Prouss, and Anatoly Vorobey. System and method for remotely analyzing the execution of computer programs. United States Patent 6,202,199, March 2001. Assignee: Mutek Solutions, Ltd. (Or Yehuda, IL).

[36]
Eric Yu En Lue. Intelligent networks for smart and dumb appliances. Available online: http://www.yuenlue.com/Literature/INSDA.2a.pdf, September 2001.