The SCEAS System
Navigation Menu

Conferences in DBLP

ISSS (isss2)
2002 (conf/isss2/2002)

  1. Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas
    Towards Security and Privacy for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:1-15 [Conf]
  2. Frank Stajano
    Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:16-27 [Conf]
  3. Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda
    Active Authentication for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:28-41 [Conf]
  4. Dan S. Wallach
    A Survey of Peer-to-Peer Security Issues. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:42-57 [Conf]
  5. John C. Mitchell, Vanessa Teague
    Autonomous Nodes and Distributed Mechanisms. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:58-83 [Conf]
  6. J. D. Tygar
    Privacy in Sensor Webs and Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:84-95 [Conf]
  7. Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
    Negotiated Privacy: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:96-111 [Conf]
  8. Kazuhiko Kato, Yoshihiro Oyama
    SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:112-132 [Conf]
  9. Oiwa Yutaka, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa
    Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:133-153 [Conf]
  10. Lujo Bauer, Jarred Ligatti, David Walker
    Types and Effects for Non-interfering Program Monitors. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:154-171 [Conf]
  11. Takahiro Shinagawa, Kenji Kono, Takashi Masuda
    Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:172-184 [Conf]
  12. Algis Rudys, Dan S. Wallach
    Enforcing Java Run-Time Properties Using Bytecode Rewriting. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:185-200 [Conf]
  13. Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe
    AnZenMail: A Secure and Certified E-mail System. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:201-216 [Conf]
  14. Reynald Affeldt, Naoki Kobayashi
    Formalization and Verification of a Mail Server in Coq. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:217-233 [Conf]
  15. Hiroyuki Nishiyama, Fumio Mizoguchi
    Design and Implementation of Security System Based on Immune System. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:234-248 [Conf]
  16. Wataru Yamazaki, Fumio Mizoguchi
    Design and Implementation of Access Control System for Smart Office Environment. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:249-262 [Conf]
  17. Andrew D. Gordon, Alan Jeffrey
    Typing One-to-One and One-to-Many Correspondences in Security Protocols. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:263-282 [Conf]
  18. George C. Necula, Robert R. Schneck
    Proof-Carrying Code with Untrusted Proof Rules. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:283-298 [Conf]
  19. Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito
    Verification of Authentication Protocols Based on the Binding Relation. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:299-316 [Conf]
  20. Cédric Fournet, Martín Abadi
    Hiding Names: Private Authentication in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:317-338 [Conf]
  21. Ran Canetti, Catherine Meadows, Paul F. Syverson
    Environmental Requirements for Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:339-355 [Conf]
  22. Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov
    A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:356-383 [Conf]
  23. Iliano Cervesato
    Data Access Specification and the Most Powerful Symbolic Attacker in MSR. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:384-416 [Conf]
  24. Koji Hasebe, Mitsuhiro Okada
    A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:417-440 [Conf]
  25. Koji Hasebe, Mitsuhiro Okada
    Formal Analysis of the iKP Electronic Payment Protocols. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:441-460 [Conf]
  26. Akira Mori, Kokichi Futatsugi
    CafeOBJ as a Tool for Behavioral System Verification. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:461-470 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002