|
Conferences in DBLP
Formal Certification of ElGamal Encryption. [Citation Graph (, )][DBLP]
Secure Information Flow as a Safety Property. [Citation Graph (, )][DBLP]
Who Can Declassify?. [Citation Graph (, )][DBLP]
Non-Interference for Deterministic Interactive Programs. [Citation Graph (, )][DBLP]
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels. [Citation Graph (, )][DBLP]
Causality and Accountability. [Citation Graph (, )][DBLP]
Dynamics, Robustness and Fragility of Trust. [Citation Graph (, )][DBLP]
Trust within the Context of Organizations: A Formal Approach. [Citation Graph (, )][DBLP]
Know What You Trust. [Citation Graph (, )][DBLP]
Privacy-Friendly Electronic Traffic Pricing via Commits. [Citation Graph (, )][DBLP]
A Formal Privacy Management Framework. [Citation Graph (, )][DBLP]
Parameterised Anonymity. [Citation Graph (, )][DBLP]
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder. [Citation Graph (, )][DBLP]
Petri Net Security Checker: Structural Non-interference at Work. [Citation Graph (, )][DBLP]
Verifying Multi-party Authentication Using Rank Functions and PVS. [Citation Graph (, )][DBLP]
The Append-Only Web Bulletin Board. [Citation Graph (, )][DBLP]
Secure Broadcast Ambients. [Citation Graph (, )][DBLP]
Extending Anticipation Games with Location, Penalty and Timeline. [Citation Graph (, )][DBLP]
Do You Really Mean What You Actually Enforced?. [Citation Graph (, )][DBLP]
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. [Citation Graph (, )][DBLP]
Access Control and Information Flow in Transactional Memory. [Citation Graph (, )][DBLP]
|