The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2004 (conf/csfw/2004)

  1. Stéphanie Delaune, Florent Jacquemard
    A Theory of Dictionary Attacks and its Complexity. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:2-15 [Conf]
  2. Olivier Pereira, Jean-Jacques Quisquater
    Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:16-19 [Conf]
  3. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:30-0 [Conf]
  4. Chiara Braghin, Daniele Gorla, Vladimiro Sassone
    A Distributed Calculus for Ro^le-Based Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:48-60 [Conf]
  5. Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon
    From Stack Inspection to Access Control: A Security Analysis for Libraries. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:61-0 [Conf]
  6. Frédéric Cuppens, Sylvain Gombault, Thierry Sans
    Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:78-87 [Conf]
  7. Magnus Almgren, Erland Jonsson
    Using Active Learning in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:88-0 [Conf]
  8. Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
    Secure Information Flow by Self-Composition. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:100-114 [Conf]
  9. Zhenyue Deng, Geoffrey Smith
    Lenient Array Operations for Practical Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:115-0 [Conf]
  10. Hubie Chen, Stephen Chong
    Owned Policies for Information Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:126-138 [Conf]
  11. Moritz Y. Becker, Peter Sewell
    Cassandra: Flexible Trust Management, Applied to Electronic Health Records. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:139-154 [Conf]
  12. Kaijun Tan, Jason Crampton, Carl A. Gunter
    The Consistency of Task-Based Authorization Constraints in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:155-0 [Conf]
  13. Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
    Enforcing Robust Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:172-186 [Conf]
  14. Annalisa Bossi, Carla Piazza, Sabina Rossi
    Modelling Downgrading in Information Flow Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:187-0 [Conf]
  15. Michael Backes, Birgit Pfitzmann
    Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:204-218 [Conf]
  16. Ran Canetti
    Universally Composable Signature, Certification, and Authentication. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:219-0 [Conf]
  17. Nathan Whitehead, Martín Abadi, George C. Necula
    By Reason and Authority: A System for Authorization of Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:236-250 [Conf]
  18. Joseph Y. Halpern, Vicky Weissman
    A Formal Foundation for XrML. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:251-0 [Conf]
  19. Rohit Chadha, Steve Kremer, Andre Scedrov
    Formal Analysis of Multi-Party Contract Signing. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:266-265 [Conf]
  20. Ron van der Meyden, Kaile Su
    Symbolic Model Checking the Knowledge of the Dining Cryptographers. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:280-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002