|
Conferences in DBLP
Language Based Secure Communication. [Citation Graph (, )][DBLP]
Refinement Types for Secure Implementations. [Citation Graph (, )][DBLP]
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. [Citation Graph (, )][DBLP]
Hyperproperties. [Citation Graph (, )][DBLP]
Security Decision-Making among Interdependent Organizations. [Citation Graph (, )][DBLP]
Tractable Enforcement of Declassification Policies. [Citation Graph (, )][DBLP]
End-to-End Enforcement of Erasure and Declassification. [Citation Graph (, )][DBLP]
Cryptographically-Sound Protocol-Model Abstractions. [Citation Graph (, )][DBLP]
An Authorization Logic With Explicit Time. [Citation Graph (, )][DBLP]
DKAL: Distributed-Knowledge Authorization Language. [Citation Graph (, )][DBLP]
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis. [Citation Graph (, )][DBLP]
Evidence-Based Audit. [Citation Graph (, )][DBLP]
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. [Citation Graph (, )][DBLP]
Specifying Secure Transport Channels. [Citation Graph (, )][DBLP]
Towards Producing Formally Checkable Security Proofs, Automatically. [Citation Graph (, )][DBLP]
Composition of Password-Based Protocols. [Citation Graph (, )][DBLP]
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. [Citation Graph (, )][DBLP]
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. [Citation Graph (, )][DBLP]
A Type System for Observational Determinism. [Citation Graph (, )][DBLP]
Information Flow in Systems with Schedulers. [Citation Graph (, )][DBLP]
A Correctness Proof of a Mesh Security Architecture. [Citation Graph (, )][DBLP]
Formal Analysis of PKCS#11. [Citation Graph (, )][DBLP]
|