|
Conferences in DBLP
- Michael Backes, Birgit Pfitzmann, Michael Waidner
Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP] FOSAD, 2004, pp:1-41 [Conf]
- Jan Jürjens
Model-Based Security Engineering with UML. [Citation Graph (0, 0)][DBLP] FOSAD, 2004, pp:42-77 [Conf]
- François Koeune, François-Xavier Standaert
A Tutorial on Physical Security and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP] FOSAD, 2004, pp:78-108 [Conf]
- Riccardo Focardi
Static Analysis of Authentication. [Citation Graph (0, 0)][DBLP] FOSAD, 2004, pp:109-132 [Conf]
- Gilles Barthe, Guillaume Dufay
Formal Methods for Smartcard Security. [Citation Graph (0, 0)][DBLP] FOSAD, 2005, pp:133-177 [Conf]
- Elisa Bertino, Ji-Won Byun, Ninghui Li
Privacy-Preserving Database Systems. [Citation Graph (0, 0)][DBLP] FOSAD, 2005, pp:178-206 [Conf]
- Hervé Debar, Jouni Viinikka
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. [Citation Graph (0, 0)][DBLP] FOSAD, 2005, pp:207-236 [Conf]
- Paolo Giorgini, Fabio Massacci, Nicola Zannone
Security and Trust Requirements Engineering. [Citation Graph (0, 0)][DBLP] FOSAD, 2005, pp:237-272 [Conf]
|