|
Conferences in DBLP
- Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas
Towards Security and Privacy for Pervasive Computing. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:1-15 [Conf]
- Frank Stajano
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:16-27 [Conf]
- Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda
Active Authentication for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:28-41 [Conf]
- Dan S. Wallach
A Survey of Peer-to-Peer Security Issues. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:42-57 [Conf]
- John C. Mitchell, Vanessa Teague
Autonomous Nodes and Distributed Mechanisms. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:58-83 [Conf]
- J. D. Tygar
Privacy in Sensor Webs and Distributed Information Systems. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:84-95 [Conf]
- Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
Negotiated Privacy: (Extended Abstract). [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:96-111 [Conf]
- Kazuhiko Kato, Yoshihiro Oyama
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:112-132 [Conf]
- Oiwa Yutaka, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:133-153 [Conf]
- Lujo Bauer, Jarred Ligatti, David Walker
Types and Effects for Non-interfering Program Monitors. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:154-171 [Conf]
- Takahiro Shinagawa, Kenji Kono, Takashi Masuda
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:172-184 [Conf]
- Algis Rudys, Dan S. Wallach
Enforcing Java Run-Time Properties Using Bytecode Rewriting. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:185-200 [Conf]
- Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe
AnZenMail: A Secure and Certified E-mail System. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:201-216 [Conf]
- Reynald Affeldt, Naoki Kobayashi
Formalization and Verification of a Mail Server in Coq. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:217-233 [Conf]
- Hiroyuki Nishiyama, Fumio Mizoguchi
Design and Implementation of Security System Based on Immune System. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:234-248 [Conf]
- Wataru Yamazaki, Fumio Mizoguchi
Design and Implementation of Access Control System for Smart Office Environment. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:249-262 [Conf]
- Andrew D. Gordon, Alan Jeffrey
Typing One-to-One and One-to-Many Correspondences in Security Protocols. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:263-282 [Conf]
- George C. Necula, Robert R. Schneck
Proof-Carrying Code with Untrusted Proof Rules. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:283-298 [Conf]
- Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito
Verification of Authentication Protocols Based on the Binding Relation. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:299-316 [Conf]
- Cédric Fournet, Martín Abadi
Hiding Names: Private Authentication in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:317-338 [Conf]
- Ran Canetti, Catherine Meadows, Paul F. Syverson
Environmental Requirements for Authentication Protocols. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:339-355 [Conf]
- Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:356-383 [Conf]
- Iliano Cervesato
Data Access Specification and the Most Powerful Symbolic Attacker in MSR. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:384-416 [Conf]
- Koji Hasebe, Mitsuhiro Okada
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:417-440 [Conf]
- Koji Hasebe, Mitsuhiro Okada
Formal Analysis of the iKP Electronic Payment Protocols. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:441-460 [Conf]
- Akira Mori, Kokichi Futatsugi
CafeOBJ as a Tool for Behavioral System Verification. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:461-470 [Conf]
|