The SCEAS System
Navigation Menu

Conferences in DBLP

Foundations of Security Analysis and Design (fosad)
2004 (conf/fosad/2005)

  1. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Justifying a Dolev-Yao Model Under Active Attacks. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:1-41 [Conf]
  2. Jan Jürjens
    Model-Based Security Engineering with UML. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:42-77 [Conf]
  3. François Koeune, François-Xavier Standaert
    A Tutorial on Physical Security and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:78-108 [Conf]
  4. Riccardo Focardi
    Static Analysis of Authentication. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2004, pp:109-132 [Conf]
  5. Gilles Barthe, Guillaume Dufay
    Formal Methods for Smartcard Security. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:133-177 [Conf]
  6. Elisa Bertino, Ji-Won Byun, Ninghui Li
    Privacy-Preserving Database Systems. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:178-206 [Conf]
  7. Hervé Debar, Jouni Viinikka
    Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:207-236 [Conf]
  8. Paolo Giorgini, Fabio Massacci, Nicola Zannone
    Security and Trust Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:237-272 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002