Conferences in DBLP
Catherine Meadows A Formal Framework and Evaluation Method for Network Denial of Service. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:4-13 [Conf ] Nancy A. Lynch I/O Automaton Models and Proofs for Shared-Key Communication Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:14-29 [Conf ] Mei Lin Hui , Gavin Lowe Safe Simplifying Transformations for Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:32-43 [Conf ] David Monniaux Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:44-54 [Conf ] Iliano Cervesato , Nancy A. Durgin , Patrick Lincoln , John C. Mitchell , Andre Scedrov A Meta-Notation for Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:55-69 [Conf ] F. Javier Thayer , Jonathan C. Herzog , Joshua D. Guttman Mixed Strand Spaces. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:72-82 [Conf ] Alfred P. Maneki Honest Functions and their Application to the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:83-89 [Conf ] Dennis M. Volpano Formalization and Proof of Secrecy Properties. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:92-95 [Conf ] Chiara Bodei , Pierpaolo Degano , Riccardo Focardi , Corrado Priami Authentication via Localized Names. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:98-110 [Conf ] Joseph Y. Halpern , Ron van der Meyden A Logic for SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:111-122 [Conf ] Colin O'Halloran Trusted System Construction. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:124-135 [Conf ] Peter Sewell , Jan Vitek Secure Composition of Insecure Components. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:136-150 [Conf ] Pierre Bieber Security Function Interactions. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:151-160 [Conf ] Ninghui Li , Joan Feigenbaum , Benjamin N. Grosof A Logic-based Knowledge Representation for Authorization with Delegation. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:162-174 [Conf ] Elisa Bertino , Elena Ferrari , Francesco Buccafurri , Pasquale Rullo A Logical Framework for Reasoning on Data Access Control Policies. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:175-189 [Conf ] Dawn Xiaodong Song Athena: A New Efficient Automatic Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:192-202 [Conf ] Antonio Durante , Riccardo Focardi , Roberto Gorrieri CVS: A Compiler for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:203-212 [Conf ] Peter Y. A. Ryan , Steve A. Schneider Process Algebra and Non-Interference. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:214-227 [Conf ] A. W. Roscoe , M. H. Goldsmith What Is Intransitive Noninterference? [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:228-238 [Conf ]