Conferences in DBLP
Aris Zakinthinos , E. Stewart Lee The composability of non-interference [system security]. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:2-8 [Conf ] A. W. Roscoe , L. Wulf Composing and decomposing systems under security properties. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:9-15 [Conf ] Alfred P. Maneki Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:16-0 [Conf ] Li Gong Optimal authentication protocols resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:24-29 [Conf ] Liqun Chen , Dieter Gollmann , Chris J. Mitchell Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:30-0 [Conf ] Colin Boyd Towards a classification of key agreement protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:38-43 [Conf ] Wenbo Mao An augmentation of BAN-like logics. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:44-0 [Conf ] Riccardo Focardi , Roberto Gorrieri , V. Panini The security checker: a semantics-based tool for the verification of security properties. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:60-69 [Conf ] Trent Jaeger , Atul Prakash Implementation of a discretionary access control model for script-based systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:70-84 [Conf ] John V. A. Janeri , Daylan B. Darby , Daniel D. Schnackenberg Building higher resolution synthetic clocks for signaling in covert timing channels. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:85-0 [Conf ] A. W. Roscoe Modelling and verifying key-exchange protocols using CSP and FDR. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:98-107 [Conf ] James W. Gray III , John McLean Using temporal logic to specify and verify cryptographic protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:108-0 [Conf ] Iwen E. Kang , Thomas F. Keefe Concurrency control for federated multilevel secure database systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:118-135 [Conf ] Simon N. Foley , Jeremy Jacob Specifying security for CSCW systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:136-0 [Conf ] Paul F. Syverson , James W. Gray III The epistemic representation of information flow security in probabilistic systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:152-166 [Conf ] William R. Bevier , Richard M. Cohen , William D. Young Connection policies and controlled interference. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:167-176 [Conf ]