The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1996 (conf/csfw/1996)

  1. Colin Boyd
    A Class of Flexible and Efficient Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:2-8 [Conf]
  2. Dalia Malki, Michael K. Reiter
    A High-Throughput Secure Reliable Multicast Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:9-17 [Conf]
  3. Patrik D'haeseleer
    An Immunological Approach to Change Detection: Theoretical Results. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:18-0 [Conf]
  4. A. W. Roscoe
    Intensional specifications of security protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:28-38 [Conf]
  5. Jonathan K. Millen, Hai-Ping Ko
    Narrowing terminates for encryption. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:39-0 [Conf]
  6. Catherine Meadows
    Language generation and verification in the NRL protocol analyzer. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:48-61 [Conf]
  7. Stephen H. Brackin
    A HOL extension of GNY for automatically analyzing cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:62-0 [Conf]
  8. Stefek Zaba
    E-Commerce Payment Protocols: Requirements and Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:78-0 [Conf]
  9. Ramesh V. Peri, William A. Wulf, Darrell M. Kienzle
    A Logic of Composition for Information Flow Predicates. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:82-94 [Conf]
  10. Aris Zakinthinos, E. Stewart Lee
    How and why feedback composition fails [secure systems]. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:95-101 [Conf]
  11. Jane Sinclair
    Action Systems for Security Specification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:102-0 [Conf]
  12. Riccardo Focardi
    Comparing Two Information Flow Security Properties. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:116-122 [Conf]
  13. Frédéric Cuppens, Claire Saurel
    Specifying a security policy: a case study. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:123-0 [Conf]
  14. Luigi Giuri, Pietro Iglio
    A Formal Model for Role-Based Access Control with Constraints. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:136-145 [Conf]
  15. Adrian Spalka
    The non-primitiveness of the simple-security property and its non-applicability to relational databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:146-0 [Conf]
  16. Peter Ryan
    A Genealogy of Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:158-0 [Conf]
  17. Gavin Lowe
    Some new attacks upon security protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:162-169 [Conf]
  18. Yvo Desmedt
    Simmons' protocol is not free of subliminal channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:170-175 [Conf]
  19. John P. McDermott, David M. Goldschlag
    Towards a model of storage jamming. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:176-0 [Conf]
  20. Paul F. Syverson
    What is an Attack on a Cryptographic Protocal? [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:188- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002