The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG 1.7 Publications (ifip1-7)
2005 (conf/ifip1-7/2005)

  1. Brian Randell, Peter Y. A. Ryan
    Voting Technologies and Trust. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:1-4 [Conf]
  2. Susan Pancho-Festin, Dieter Gollmann
    On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:5-15 [Conf]
  3. Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
    Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:16-33 [Conf]
  4. Rob Delicata, Steve A. Schneider
    A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:34-46 [Conf]
  5. Boris Köpf, Heiko Mantel
    Eliminating Implicit Information Leaks by Transformational Typing and Unification. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:47-62 [Conf]
  6. Nicoletta De Francesco, Luca Martini
    Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:63-80 [Conf]
  7. Jeremy Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan
    Opacity Generalised to Transition Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:81-95 [Conf]
  8. Constantin Enea
    Unifying Decidability Results on Protection Systems Using Simulations. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:96-111 [Conf]
  9. Gilles Barthe, Tamara Rezk, Ando Saabas
    Proof Obligations Preserving Compilation. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:112-126 [Conf]
  10. Hongbin Zhou, Simon N. Foley
    A Logic for Analysing Subterfuge in Delegation Chains. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:127-141 [Conf]
  11. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Probable Innocence Revisited. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:142-157 [Conf]
  12. Johan W. Klüwer, Arild Waaler
    Relative Trustworthiness. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:158-170 [Conf]
  13. Simon Winwood, Manuel M. T. Chakravarty
    Secure Untrusted Binaries - Provably!. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:171-186 [Conf]
  14. Olga Pacheco
    Normative Specification: A Tool for Trust and Security. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:187-202 [Conf]
  15. Tom Chothia, Dominic Duggan
    Type-Based Distributed Access Control vs. Untyped Attackers. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:203-216 [Conf]
  16. Romain Laborde, François Barrère, Abdelmalek Benzekri
    A Security Management Information Model Derivation Framework: From Goals to Configurations. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:217-234 [Conf]
  17. Aybek Mukhamedov, Mark Dermot Ryan
    On Anonymity with Identity Escrow. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:235-243 [Conf]
  18. Kun Wei, James Heather
    Towards Verification of Timed Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:244-257 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002