The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2000 (conf/csfw/2000)

  1. Ninghui Li
    Local Names in SPKI/SDSI. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:2-15 [Conf]
  2. Jonathan K. Millen, Rebecca N. Wright
    Reasoning about Trust and Insurance in a Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:16-22 [Conf]
  3. Joshua D. Guttman, F. Javier Thayer
    Protocol Independence through Disjoint Encryption. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:24-34 [Conf]
  4. Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov
    Relating Strands and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:35-51 [Conf]
  5. Grit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe
    Optimizing Protocol Rewrite Rules of CIL Specifications. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:52-62 [Conf]
  6. Adrian Perrig, D. Song
    Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:64-76 [Conf]
  7. Anthony H. Dekker
    C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:77-87 [Conf]
  8. Luigia Carlucci Aiello, Fabio Massacci
    An Executable Specification Language for Planning Attacks to Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:88-102 [Conf]
  9. Teresa F. Lunt
    Foundations for Intrusion Detection?. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:104-106 [Conf]
  10. Tuomas Aura, Matt Bishop, Dean Sniegowski
    Analyzing Single-Server Network Inhibition. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:108-117 [Conf]
  11. Pankaj Kakkar, Carl A. Gunter, Martín Abadi
    Reasoning about Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:118-129 [Conf]
  12. James Heather, Steve Schneider
    Towards Automatic Verification of Authentication Protocols on an Unbounded Network. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:132-143 [Conf]
  13. Ernie Cohen
    TAPS: A First-Order Verifier for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:144-158 [Conf]
  14. Catherine Meadows
    Invariant Generation Techniques in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:159-167 [Conf]
  15. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Information Flow Analysis in a Discrete-Time Process Algebra. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:170-184 [Conf]
  16. Heiko Mantel
    Possibilistic Definitions of Security - An Assembly Kit. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:185-199 [Conf]
  17. Andrei Sabelfeld, David Sands
    Probabilistic Noninterference for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:200-214 [Conf]
  18. Anthony E. Sale
    Lorenz and Colossus. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:216-222 [Conf]
  19. Günter Karjoth
    An Operational Semantics of Java 2 Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:224-232 [Conf]
  20. Mads Dam, Pablo Giambiagi
    Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:233-244 [Conf]
  21. Dennis M. Volpano
    Secure Introduction of One-Way Functions. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:246-254 [Conf]
  22. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:255-268 [Conf]
  23. Peter Sewell, Jan Vitek
    Secure Composition of Untrusted Code: Wrappers and Causality Types. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:269-284 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002