Conferences in DBLP
Alessandra Di Pierro , Chris Hankin , Herbert Wiklicky Approximate Non-Interference. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:3-17 [Conf ] Gavin Lowe Quantifying Information Flow. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:18-31 [Conf ] Joseph Y. Halpern , Kevin R. O'Neill Secrecy in Multiagent Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:32-0 [Conf ] Somesh Jha , Oleg Sheyner , Jeannette M. Wing Two Formal Analys s of Attack Graphs. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:49-63 [Conf ] Jean-Philippe Pouzol , Mireille Ducassé Formal Specification of Intrusion Signatures and Detection Rules. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:64-0 [Conf ] Andrew D. Gordon , Alan Jeffrey Types and Effects for Asymmetric Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:77-91 [Conf ] Joshua D. Guttman Security Protocol Design via Authentication Tests. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:92-103 [Conf ] James Heather Strand Spaces and Rank Functions: More than Distant Cousins. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:104-0 [Conf ] Vitaly Shmatikov Probabilistic Analysis of Anonymity. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:119-128 [Conf ] Somesh Jha , Thomas W. Reps Analysis of SPKI/SDSI Certificates Using Model Checking. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:129-0 [Conf ] Philippa J. Broadfoot , A. W. Roscoe Capturing Parallel Attacks within the Data Independence Framework. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:147-159 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Steiner , Michael Waidner Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:160-174 [Conf ] Frederick Butler , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov A Formal Analysis of Some Properties of Kerberos 5 Using MSR. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:175-0 [Conf ] Levente Buttyán , Jean-Pierre Hubaux , Srdjan Capkun A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:193-205 [Conf ] Steve Kremer , Jean-François Raskin Game Analysis of Abuse-free Contract Signing. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:206-0 [Conf ] Vincent Simonet Fine-Grained Information Flow Analysis for a \lambda Calculus with Sum Types. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:223-237 [Conf ] Dominic Duggan Cryptographic Types. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:238-252 [Conf ] Anindya Banerjee , David A. Naumann Secure Information Flow and Pointer Confinement in a Java-like Language. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:253-0 [Conf ] Günter Karjoth , Matthias Schunter A Privacy Policy Model for Enterprises. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:271-281 [Conf ] Riccardo Pucella , Vicky Weissman A Logic for Reasoning about Digital Rights. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:282-294 [Conf ] Nicholas Tran Hiding Functions and Computational Security of Image Watermarking Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:295-0 [Conf ] Riccardo Focardi , Sabina Rossi Information Flow Security in Dynamic Contexts. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:307-319 [Conf ] François Pottier A Simple View of Type-Secure Information Flow in the p-Calculus. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:320-330 [Conf ]