|
Conferences in DBLP
- Martín Abadi
Security Protocols: Principles and Calculi. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:1-23 [Conf]
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino
Secure Service Orchestration. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:24-74 [Conf]
- Daniel Le Métayer
IT Security Analysis Best Practices and Formal Approaches. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:75-91 [Conf]
- Úlfar Erlingsson
Low-Level Software Security: Attacks and Defenses. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:92-134 [Conf]
- Fabio Martinelli, Paolo Mori
Enhancing Java Security with History Based Access Control. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:135-159 [Conf]
- Javier Lopez, Cristina Alcaraz, Rodrigo Roman
On the Protection and Technologies of Critical Information Infrastructures. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:160-182 [Conf]
- Liqun Chen
An Interpretation of Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:183-208 [Conf]
- Audun Jøsang
Trust and Reputation Systems. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:209-245 [Conf]
- Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough
An Introduction to the Role Based Trust Management Framework RT. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:246-281 [Conf]
- Eimear Gallery, Chris J. Mitchell
Trusted Mobile Platforms. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:282-323 [Conf]
|