The SCEAS System
Navigation Menu

Conferences in DBLP

(psec)
2009 (conf/psec/2009)


  1. Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. [Citation Graph (, )][DBLP]


  2. Validating Integrity for the Ephemerizer's Protocol with CL-Atse. [Citation Graph (, )][DBLP]


  3. Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols. [Citation Graph (, )][DBLP]


  4. Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin. [Citation Graph (, )][DBLP]


  5. Comparing State Spaces in Automatic Security Protocol Analysis. [Citation Graph (, )][DBLP]


  6. Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. [Citation Graph (, )][DBLP]


  7. Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. [Citation Graph (, )][DBLP]


  8. New Anonymity Notions for Identity-Based Encryption. [Citation Graph (, )][DBLP]


  9. Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption. [Citation Graph (, )][DBLP]


  10. Writing an OS Kernel in a Strictly and Statically Typed Language. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002