Conferences in DBLP
Ninghui Li Local Names in SPKI/SDSI. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:2-15 [Conf ] Jonathan K. Millen , Rebecca N. Wright Reasoning about Trust and Insurance in a Public Key Infrastructure. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:16-22 [Conf ] Joshua D. Guttman , F. Javier Thayer Protocol Independence through Disjoint Encryption. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:24-34 [Conf ] Iliano Cervesato , Nancy A. Durgin , John C. Mitchell , Patrick Lincoln , Andre Scedrov Relating Strands and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:35-51 [Conf ] Grit Denker , Jonathan K. Millen , Antonio Grau , Juliana Küster Filipe Optimizing Protocol Rewrite Rules of CIL Specifications. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:52-62 [Conf ] Adrian Perrig , D. Song Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:64-76 [Conf ] Anthony H. Dekker C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:77-87 [Conf ] Luigia Carlucci Aiello , Fabio Massacci An Executable Specification Language for Planning Attacks to Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:88-102 [Conf ] Teresa F. Lunt Foundations for Intrusion Detection?. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:104-106 [Conf ] Tuomas Aura , Matt Bishop , Dean Sniegowski Analyzing Single-Server Network Inhibition. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:108-117 [Conf ] Pankaj Kakkar , Carl A. Gunter , Martín Abadi Reasoning about Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:118-129 [Conf ] James Heather , Steve Schneider Towards Automatic Verification of Authentication Protocols on an Unbounded Network. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:132-143 [Conf ] Ernie Cohen TAPS: A First-Order Verifier for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:144-158 [Conf ] Catherine Meadows Invariant Generation Techniques in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:159-167 [Conf ] Riccardo Focardi , Roberto Gorrieri , Fabio Martinelli Information Flow Analysis in a Discrete-Time Process Algebra. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:170-184 [Conf ] Heiko Mantel Possibilistic Definitions of Security - An Assembly Kit. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:185-199 [Conf ] Andrei Sabelfeld , David Sands Probabilistic Noninterference for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:200-214 [Conf ] Anthony E. Sale Lorenz and Colossus. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:216-222 [Conf ] Günter Karjoth An Operational Semantics of Java 2 Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:224-232 [Conf ] Mads Dam , Pablo Giambiagi Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:233-244 [Conf ] Dennis M. Volpano Secure Introduction of One-Way Functions. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:246-254 [Conf ] James Heather , Gavin Lowe , Steve Schneider How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:255-268 [Conf ] Peter Sewell , Jan Vitek Secure Composition of Untrusted Code: Wrappers and Causality Types. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:269-284 [Conf ]