The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2002 (conf/csfw/2002)

  1. Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky
    Approximate Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:3-17 [Conf]
  2. Gavin Lowe
    Quantifying Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:18-31 [Conf]
  3. Joseph Y. Halpern, Kevin R. O'Neill
    Secrecy in Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:32-0 [Conf]
  4. Somesh Jha, Oleg Sheyner, Jeannette M. Wing
    Two Formal Analys s of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:49-63 [Conf]
  5. Jean-Philippe Pouzol, Mireille Ducassé
    Formal Specification of Intrusion Signatures and Detection Rules. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:64-0 [Conf]
  6. Andrew D. Gordon, Alan Jeffrey
    Types and Effects for Asymmetric Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:77-91 [Conf]
  7. Joshua D. Guttman
    Security Protocol Design via Authentication Tests. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:92-103 [Conf]
  8. James Heather
    Strand Spaces and Rank Functions: More than Distant Cousins. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:104-0 [Conf]
  9. Vitaly Shmatikov
    Probabilistic Analysis of Anonymity. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:119-128 [Conf]
  10. Somesh Jha, Thomas W. Reps
    Analysis of SPKI/SDSI Certificates Using Model Checking. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:129-0 [Conf]
  11. Philippa J. Broadfoot, A. W. Roscoe
    Capturing Parallel Attacks within the Data Independence Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:147-159 [Conf]
  12. Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner
    Polynomial Fairness and Liveness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:160-174 [Conf]
  13. Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov
    A Formal Analysis of Some Properties of Kerberos 5 Using MSR. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:175-0 [Conf]
  14. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:193-205 [Conf]
  15. Steve Kremer, Jean-François Raskin
    Game Analysis of Abuse-free Contract Signing. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:206-0 [Conf]
  16. Vincent Simonet
    Fine-Grained Information Flow Analysis for a \lambda Calculus with Sum Types. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:223-237 [Conf]
  17. Dominic Duggan
    Cryptographic Types. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:238-252 [Conf]
  18. Anindya Banerjee, David A. Naumann
    Secure Information Flow and Pointer Confinement in a Java-like Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:253-0 [Conf]
  19. Günter Karjoth, Matthias Schunter
    A Privacy Policy Model for Enterprises. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:271-281 [Conf]
  20. Riccardo Pucella, Vicky Weissman
    A Logic for Reasoning about Digital Rights. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:282-294 [Conf]
  21. Nicholas Tran
    Hiding Functions and Computational Security of Image Watermarking Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:295-0 [Conf]
  22. Riccardo Focardi, Sabina Rossi
    Information Flow Security in Dynamic Contexts. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:307-319 [Conf]
  23. François Pottier
    A Simple View of Type-Secure Information Flow in the p-Calculus. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:320-330 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002