|
Conferences in DBLP
- Stéphanie Delaune, Florent Jacquemard
A Theory of Dictionary Attacks and its Complexity. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:2-15 [Conf]
- Olivier Pereira, Jean-Jacques Quisquater
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:16-19 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:30-0 [Conf]
- Chiara Braghin, Daniele Gorla, Vladimiro Sassone
A Distributed Calculus for Ro^le-Based Access Control. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:48-60 [Conf]
- Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon
From Stack Inspection to Access Control: A Security Analysis for Libraries. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:61-0 [Conf]
- Frédéric Cuppens, Sylvain Gombault, Thierry Sans
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:78-87 [Conf]
- Magnus Almgren, Erland Jonsson
Using Active Learning in Intrusion Detection. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:88-0 [Conf]
- Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
Secure Information Flow by Self-Composition. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:100-114 [Conf]
- Zhenyue Deng, Geoffrey Smith
Lenient Array Operations for Practical Secure Information Flow. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:115-0 [Conf]
- Hubie Chen, Stephen Chong
Owned Policies for Information Security. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:126-138 [Conf]
- Moritz Y. Becker, Peter Sewell
Cassandra: Flexible Trust Management, Applied to Electronic Health Records. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:139-154 [Conf]
- Kaijun Tan, Jason Crampton, Carl A. Gunter
The Consistency of Task-Based Authorization Constraints in Workflow Systems. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:155-0 [Conf]
- Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
Enforcing Robust Declassification. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:172-186 [Conf]
- Annalisa Bossi, Carla Piazza, Sabina Rossi
Modelling Downgrading in Information Flow Security. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:187-0 [Conf]
- Michael Backes, Birgit Pfitzmann
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:204-218 [Conf]
- Ran Canetti
Universally Composable Signature, Certification, and Authentication. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:219-0 [Conf]
- Nathan Whitehead, Martín Abadi, George C. Necula
By Reason and Authority: A System for Authorization of Proof-Carrying Code. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:236-250 [Conf]
- Joseph Y. Halpern, Vicky Weissman
A Formal Foundation for XrML. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:251-0 [Conf]
- Rohit Chadha, Steve Kremer, Andre Scedrov
Formal Analysis of Multi-Party Contract Signing. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:266-265 [Conf]
- Ron van der Meyden, Kaile Su
Symbolic Model Checking the Knowledge of the Dining Cryptographers. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:280-0 [Conf]
|