The SCEAS System
Navigation Menu

Conferences in DBLP

Formal Aspects of Security (fasec)
2002 (conf/fasec/2002)

  1. Fred B. Schneider
    Lifting Reference Monitors from the Kernel. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:1-2 [Conf]
  2. Andy Gordon
    Authenticity Types for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:3- [Conf]
  3. Lawrence C. Paulson
    Verifying the SET Protocol: Overview. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:4-14 [Conf]
  4. David von Oheimb
    Interacting State Machines: A Stateful Approach to Proving Security. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:15-32 [Conf]
  5. Frédéric Oehl, Gérard Cécé, Olga Kouchnarenko, David Sinclair
    Automatic Approximation for the Verification of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:33-48 [Conf]
  6. Colin Boyd, Kapali Viswanathan
    Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:49-61 [Conf]
  7. Susan Stepney
    Critical Critical Systems. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:62-70 [Conf]
  8. Dieter Gollmann
    Analysing Security Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:71-80 [Conf]
  9. Gethin Norman, Vitaly Shmatikov
    Analysis of Probabilistic Contract Signing. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:81-96 [Conf]
  10. Sigrid Gürgens, Carsten Rudolph
    Security Analysis of (Un-) Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:97-114 [Conf]
  11. Joseph Y. Halpern, Riccardo Pucella
    Modeling Adversaries in a Logic for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:115-132 [Conf]
  12. Mourad Debbabi, Josee Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi
    Secure Self-certified Code for Java. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:133-151 [Conf]
  13. Anthony Hall
    Z Styles for Security Properties and Modern User Interfaces. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:152-166 [Conf]
  14. Bart Preneel
    Cryptographic Challenges: The Past and the Future. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:167-182 [Conf]
  15. Ernie Cohen
    TAPS: The Last Few Slides. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:183-190 [Conf]
  16. Antonio Durante, Roberto Di Pietro, Luigi V. Mancini
    Formal Specification for Fast Automatic IDS Training. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:191-204 [Conf]
  17. Gordon Thomas Rohrmair, Gavin Lowe
    Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:205-220 [Conf]
  18. Felix C. Gärtner
    Revisiting Liveness Properties in the Context of Secure Systems. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:221-238 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002