The SCEAS System
Navigation Menu

Conferences in DBLP

ISSS (isss2)
2003 (conf/isss2/2003)

  1. Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov
    Verifying Confidentiality and Authentication in Kerberos 5. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:1-24 [Conf]
  2. Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda
    A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:25-44 [Conf]
  3. Kazuhiro Ogata, Kokichi Futatsugi
    Formal Analysis of the NetBill Electronic Commerce Protocol. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:45-64 [Conf]
  4. Koji Hasebe, Mitsuhiro Okada
    Inferences on Honesty in Compositional Logic for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:65-86 [Conf]
  5. Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki
    A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:87-112 [Conf]
  6. Weijiang Yu, Aloysius K. Mok
    Formal Specification and Verification of Resource Bound Security Using PVS. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:113-133 [Conf]
  7. Bart Jacobs, Erik Poll
    Java Program Verification at Nijmegen: Developments and Perspective. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:134-153 [Conf]
  8. Noriaki Yoshiura
    Decision Procedures for Several Properties of Reactive System Specifications. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:154-173 [Conf]
  9. Andrei Sabelfeld, Andrew C. Myers
    A Model for Delimited Information Release. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:174-191 [Conf]
  10. Kohei Suenaga, Oiwa Yutaka, Eijiro Sumii, Akinori Yonezawa
    The Interface Definition Language for Fail-Safe C. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:192-208 [Conf]
  11. Matthew Harren, George C. Necula
    Lightweight Wrappers for Interfacing with Binary Code in CCured. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:209-225 [Conf]
  12. Akira Mori
    Detecting Unknown Computer Viruses - A New Approach. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:226-241 [Conf]
  13. Hirotake Abe, Kazuhiko Kato
    Security Policy Descriptions Through the Use of Control Structure of a Target Program. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:242-261 [Conf]
  14. Yasushi Shinjo, Yoshinori Nakata, Kozo Itano
    Securing RPC with a Reference Monitor for System Calls. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:262-280 [Conf]
  15. Osamu Sato, Richard Potter, Mitsuharu Yamamoto, Masami Hagiya
    UML Scrapbook and Realization of Snapshot Programming Environment. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:281-295 [Conf]
  16. David P. Gilliam
    Managing Information Technology Security Risk. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:296-317 [Conf]
  17. Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    SEAS: A Secure E-Voting Applet System. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:318-329 [Conf]
  18. Hiroyuki Nishiyama, Yukinobu Mine, Fumio Mizoguchi
    The Design of a Secure Distributed Devices System Based on Immunity. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:330-344 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002