The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1999 (conf/csfw/1999)

  1. Catherine Meadows
    A Formal Framework and Evaluation Method for Network Denial of Service. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:4-13 [Conf]
  2. Nancy A. Lynch
    I/O Automaton Models and Proofs for Shared-Key Communication Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:14-29 [Conf]
  3. Mei Lin Hui, Gavin Lowe
    Safe Simplifying Transformations for Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:32-43 [Conf]
  4. David Monniaux
    Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:44-54 [Conf]
  5. Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov
    A Meta-Notation for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:55-69 [Conf]
  6. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Mixed Strand Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:72-82 [Conf]
  7. Alfred P. Maneki
    Honest Functions and their Application to the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:83-89 [Conf]
  8. Dennis M. Volpano
    Formalization and Proof of Secrecy Properties. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:92-95 [Conf]
  9. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Corrado Priami
    Authentication via Localized Names. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:98-110 [Conf]
  10. Joseph Y. Halpern, Ron van der Meyden
    A Logic for SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:111-122 [Conf]
  11. Colin O'Halloran
    Trusted System Construction. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:124-135 [Conf]
  12. Peter Sewell, Jan Vitek
    Secure Composition of Insecure Components. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:136-150 [Conf]
  13. Pierre Bieber
    Security Function Interactions. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:151-160 [Conf]
  14. Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof
    A Logic-based Knowledge Representation for Authorization with Delegation. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:162-174 [Conf]
  15. Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo
    A Logical Framework for Reasoning on Data Access Control Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:175-189 [Conf]
  16. Dawn Xiaodong Song
    Athena: A New Efficient Automatic Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:192-202 [Conf]
  17. Antonio Durante, Riccardo Focardi, Roberto Gorrieri
    CVS: A Compiler for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:203-212 [Conf]
  18. Peter Y. A. Ryan, Steve A. Schneider
    Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:214-227 [Conf]
  19. A. W. Roscoe, M. H. Goldsmith
    What Is Intransitive Noninterference? [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:228-238 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002