The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2006 (conf/ccs/2006fmse)

  1. Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee
    Securing the drop-box architecture for assisted living. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:1-12 [Conf]
  2. Silvia Crafa, Sabina Rossi
    P-congruences as non-interference for the pi-calculus. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:13-22 [Conf]
  3. Jan Cederquist, Muhammad Torabi Dashti
    An intruder model for verifying liveness in security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:23-32 [Conf]
  4. Geoffrey Smith
    Secure information flow with random assignment and encryption. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:33-44 [Conf]
  5. Adam J. Lee, Jodie P. Boyer, Lars Olson, Carl A. Gunter
    Defeasible security policy composition for web services. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:45-54 [Conf]
  6. Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert
    NETRA: : seeing through access control. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:55-66 [Conf]
  7. Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Bridging the gap between web application firewalls and web applications. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:67-77 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002