The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2001 (conf/csfw/2001)

  1. Sylvan Pinsky, Edward Zieglar
    Noninterference Equations for Nondeterministic Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:3-4 [Conf]
  2. Steve Zdancewic, Andrew C. Myers
    Robust Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:15- [Conf]
  3. Ajay Chander, John C. Mitchell, Drew Dean
    A State-Transition Model of Trust Management and Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:27-43 [Conf]
  4. Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera
    Revocations-A Classification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:44-58 [Conf]
  5. Joseph Y. Halpern, Ron van der Meyden
    A Logical Reconstruction of SPKI. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:59-0 [Conf]
  6. Olivier Pereira, Jean-Jacques Quisquater
    A Security Analysis of the Cliques Protocols Suites. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:73-81 [Conf]
  7. Bruno Blanchet
    An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:82-96 [Conf]
  8. Véronique Cortier, Jonathan K. Millen, Harald Rueß
    Proving Secrecy is Easy Enough. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:97-0 [Conf]
  9. Andre Scedrov, Ran Canetti, Joshua D. Guttman, David Wagner, Michael Waidner
    Relating Cryptography and Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:111-114 [Conf]
  10. Geoffrey Smith
    A New Type System for Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:115-125 [Conf]
  11. Heiko Mantel, Andrei Sabelfeld
    A Generic Approach to the Security of Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:126-0 [Conf]
  12. Andrew D. Gordon, Alan Jeffrey
    Authenticity by Typing for Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:145-159 [Conf]
  13. Marcelo P. Fiore, Martín Abadi
    Computing Symbolic Models for Verifying Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:160-173 [Conf]
  14. Michaël Rusinowitch, Mathieu Turuani
    Protocol Insecurity with Finite Number of Sessions is NP-Complete. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:174-0 [Conf]
  15. Peng Liu, Sushil Jajodia
    Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:191-205 [Conf]
  16. Somesh Jha, Kymie M. C. Tan, Roy A. Maxion
    Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:206-219 [Conf]
  17. Muriel Roger, Jean Goubault-Larrecq
    Log Auditing through Model-Checking. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:220-0 [Conf]
  18. Peter Ryan, John D. McLean, Jonathan K. Millen, Virgil D. Gligor
    Non-Interference: Who Needs It? [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:237-0 [Conf]
  19. Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
    A Compositional Logic for Protocol Correctness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:241-0 [Conf]
  20. Wenliang Du, Mikhail J. Atallah
    Privacy-Preserving Cooperative Scientific Computations. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:273-294 [Conf]
  21. Maritta Heisel, Andreas Pfitzmann, Thomas Santen
    Confidentiality-Preserving Refinement. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:295-306 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002