|
Conferences in DBLP
- Santiago Escobar, Catherine Meadows, José Meseguer
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:1-12 [Conf]
- Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
On fairness in simulatability-based cryptographic systems. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:13-22 [Conf]
- Prateek Gupta, Vitaly Shmatikov
Towards computationally sound symbolic analysis of key exchange protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:23-32 [Conf]
- Peter Chapin, Christian Skalka, Xiaoyang Sean Wang
Risk assessment in distributed authorization. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:33-42 [Conf]
- Avik Chaudhuri, Martín Abadi
Formal security analysis of basic network-attached storage. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:43-52 [Conf]
- Heiko Mantel
The framework of selective interleaving functions and the modular assembly kit. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:53-62 [Conf]
- Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum
Provable anonymity. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:63-72 [Conf]
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:73-82 [Conf]
|