|
Conferences in DBLP
- Geoffrey Smith
Probabilistic Noninterference through Weak Probabilistic Bisimulation. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:3-13 [Conf]
- Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi
Secure Contexts for Confidential Data. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:14-28 [Conf]
- Steve Zdancewic, Andrew C. Myers
Observational Determinism for Concurrent Program Security. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:29-0 [Conf]
- Jonathan K. Millen, Vitaly Shmatikov
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:47-61 [Conf]
- Catherine Meadows
A Procedure for Verifying Security Against Type Confusion Attacks. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:62-0 [Conf]
- Joseph Y. Halpern, Kevin R. O'Neill
Anonymity and Information Hiding in Multiagent Systems. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:75-88 [Conf]
- Ninghui Li, John C. Mitchell
Understanding SPKI/SDSI Using First-Order Logic. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:89-0 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:109-125 [Conf]
- Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Automatic Validation of Protocol Narration. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:126-140 [Conf]
- Philippa J. Broadfoot, Gavin Lowe
On Distributed Security Transactions that Use Secure Transport Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:141-0 [Conf]
- Anindya Banerjee, David A. Naumann
Using Access Control for Secure Information Flow in a Java-like Language. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:155-169 [Conf]
- Tom Chothia, Dominic Duggan, Jan Vitek
Type-Based Distributed Access Control. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:170-0 [Conf]
- Joseph Y. Halpern, Vicky Weissman
Using First-Order Logic to Reason about Policies. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:187-201 [Conf]
- Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine
On Generalized Authorization Problems. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:202-0 [Conf]
- Liqun Chen, Caroline Kudla
Identity Based Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:219-233 [Conf]
- Jonathan C. Herzog
The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:234-247 [Conf]
- Bogdan Warinschi
A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:248-0 [Conf]
|