The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2006 (conf/csfw/2006)

  1. Marieke Huisman, Pratik Worah, Kim Sunesen
    A Temporal Logic Characterisation of Observational Determinism. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:3- [Conf]
  2. Peng Li, Steve Zdancewic
    Encoding Information Flow in Haskell. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:16- [Conf]
  3. Stéphanie Delaune, Steve Kremer, Mark Ryan
    Coercion-Resistance and Receipt-Freeness in Electronic Voting. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:28-42 [Conf]
  4. Shai Rubin, Somesh Jha, Barton P. Miller
    On the Completeness of Attack Mutation Algorithms. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:43-56 [Conf]
  5. Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari
    Types and Effects for Secure Service Orchestration. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:57-69 [Conf]
  6. Krishnendu Chatterjee, Radha Jagadeesan, Corin Pitcher
    Games for Controls. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:70-84 [Conf]
  7. Michael J. May, Carl A. Gunter, Insup Lee
    Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:85-97 [Conf]
  8. Jason Crampton, Keith Martin, Peter Wild
    On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:98-111 [Conf]
  9. Avik Chaudhuri, Martín Abadi
    Secrecy by Typing and File-Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:112-123 [Conf]
  10. Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan
    Policy Analysis for Administrative Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:124-138 [Conf]
  11. Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Stephen Tse
    Verified Interoperable Implementations of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:139-152 [Conf]
  12. Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
    Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:153-166 [Conf]
  13. Aybek Mukhamedov, Mark Dermot Ryan
    Resolve-Impossibility for a Contract-Signing Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:167-176 [Conf]
  14. Alejandro Russo, Andrei Sabelfeld
    Securing Interaction between Threads and the Scheduler. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:177-189 [Conf]
  15. Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong
    Information-Flow Security for Interactive Programs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:190-201 [Conf]
  16. Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic
    Managing Policy Updates in Security-Typed Languages. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:202-216 [Conf]
  17. Daniel Hedin, David Sands
    Noninterference in the Presence of Non-Opaque Pointers. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:217-229 [Conf]
  18. Riccardo Pucella, Fred B. Schneider
    Independence From Obfuscation: A Semantic Framework for Dive. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:230-241 [Conf]
  19. Stephen Chong, Andrew C. Myers
    Decentralized Robustness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:242-256 [Conf]
  20. Antonio Lain, Miranda Mowbray
    Distributed Authorization Using Delegation with Acyclic Paths. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:257-269 [Conf]
  21. Hongbin Zhou, Simon N. Foley
    A Framework for Establishing Decentralized Secure Coalitions. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:270-282 [Conf]
  22. Deepak Garg, Frank Pfenning
    Non-Interference in Constructive Authorization Logic. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:283-296 [Conf]
  23. Kim-Kwang Raymond Choo
    Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:297-308 [Conf]
  24. Ralf Küsters
    Simulation-Based Security with Inexhaustible Interactive Turing Machines. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:309-320 [Conf]
  25. Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
    Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:321-334 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002