The SCEAS System
Navigation Menu

Conferences in DBLP

Symposium on Principles of Programming Languages (POPL) (popl)
2005 (conf/popl/2005wits)


  1. Handling declared information leakage: extended abstract. [Citation Graph (, )][DBLP]


  2. Policy framings for access control. [Citation Graph (, )][DBLP]


  3. Specifying Kerberos 5 cross-realm authentication. [Citation Graph (, )][DBLP]


  4. Using static analysis to validate the SAML single sign-on protocol. [Citation Graph (, )][DBLP]


  5. Inferring authentication tags. [Citation Graph (, )][DBLP]


  6. Statically checking confidentiality via dynamic labels. [Citation Graph (, )][DBLP]


  7. Enterprise privacy promises and enforcement. [Citation Graph (, )][DBLP]


  8. Formal prototyping in early stages of protocol design. [Citation Graph (, )][DBLP]


  9. A variant of the Chaum voter-verifiable scheme. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002