The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2003 (conf/csfw/2003)

  1. Geoffrey Smith
    Probabilistic Noninterference through Weak Probabilistic Bisimulation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:3-13 [Conf]
  2. Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi
    Secure Contexts for Confidential Data. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:14-28 [Conf]
  3. Steve Zdancewic, Andrew C. Myers
    Observational Determinism for Concurrent Program Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:29-0 [Conf]
  4. Jonathan K. Millen, Vitaly Shmatikov
    Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:47-61 [Conf]
  5. Catherine Meadows
    A Procedure for Verifying Security Against Type Confusion Attacks. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:62-0 [Conf]
  6. Joseph Y. Halpern, Kevin R. O'Neill
    Anonymity and Information Hiding in Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:75-88 [Conf]
  7. Ninghui Li, John C. Mitchell
    Understanding SPKI/SDSI Using First-Order Logic. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:89-0 [Conf]
  8. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:109-125 [Conf]
  9. Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Automatic Validation of Protocol Narration. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:126-140 [Conf]
  10. Philippa J. Broadfoot, Gavin Lowe
    On Distributed Security Transactions that Use Secure Transport Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:141-0 [Conf]
  11. Anindya Banerjee, David A. Naumann
    Using Access Control for Secure Information Flow in a Java-like Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:155-169 [Conf]
  12. Tom Chothia, Dominic Duggan, Jan Vitek
    Type-Based Distributed Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:170-0 [Conf]
  13. Joseph Y. Halpern, Vicky Weissman
    Using First-Order Logic to Reason about Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:187-201 [Conf]
  14. Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine
    On Generalized Authorization Problems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:202-0 [Conf]
  15. Liqun Chen, Caroline Kudla
    Identity Based Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:219-233 [Conf]
  16. Jonathan C. Herzog
    The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:234-247 [Conf]
  17. Bogdan Warinschi
    A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:248-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002