|
Conferences in DBLP
Formal methods in security engineering: where we've been, where we are, where we need to go. [Citation Graph (, )][DBLP]
Verification condition generation for conditional information flow. [Citation Graph (, )][DBLP]
A simple and expressive semantic framework for policy composition in access control. [Citation Graph (, )][DBLP]
Formal correctness of conflict detection for firewalls. [Citation Graph (, )][DBLP]
Security policy compliance with violation management. [Citation Graph (, )][DBLP]
Cryptol: specification, implementation and verification of high-grade cryptographic applications. [Citation Graph (, )][DBLP]
Security policy analysis using deductive spreadsheets. [Citation Graph (, )][DBLP]
A calculus of challenges and responses. [Citation Graph (, )][DBLP]
Selecting theories and nonce generation for recursive protocols. [Citation Graph (, )][DBLP]
Weaving rewrite-based access control policies. [Citation Graph (, )][DBLP]
|