|
Conferences in DBLP
Handling declared information leakage: extended abstract. [Citation Graph (, )][DBLP]
Policy framings for access control. [Citation Graph (, )][DBLP]
Specifying Kerberos 5 cross-realm authentication. [Citation Graph (, )][DBLP]
Using static analysis to validate the SAML single sign-on protocol. [Citation Graph (, )][DBLP]
Inferring authentication tags. [Citation Graph (, )][DBLP]
Statically checking confidentiality via dynamic labels. [Citation Graph (, )][DBLP]
Enterprise privacy promises and enforcement. [Citation Graph (, )][DBLP]
Formal prototyping in early stages of protocol design. [Citation Graph (, )][DBLP]
A variant of the Chaum voter-verifiable scheme. [Citation Graph (, )][DBLP]
|