Conferences in DBLP
Frederick Butler , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov Verifying Confidentiality and Authentication in Kerberos 5. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:1-24 [Conf ] Daigo Tomioka , Shin-ya Nishizaki , Ritsuya Ikeda A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:25-44 [Conf ] Kazuhiro Ogata , Kokichi Futatsugi Formal Analysis of the NetBill Electronic Commerce Protocol. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:45-64 [Conf ] Koji Hasebe , Mitsuhiro Okada Inferences on Honesty in Compositional Logic for Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:65-86 [Conf ] Ashraf Bhery , Shigeki Hagihara , Naoki Yonezaki A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:87-112 [Conf ] Weijiang Yu , Aloysius K. Mok Formal Specification and Verification of Resource Bound Security Using PVS. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:113-133 [Conf ] Bart Jacobs , Erik Poll Java Program Verification at Nijmegen: Developments and Perspective. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:134-153 [Conf ] Noriaki Yoshiura Decision Procedures for Several Properties of Reactive System Specifications. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:154-173 [Conf ] Andrei Sabelfeld , Andrew C. Myers A Model for Delimited Information Release. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:174-191 [Conf ] Kohei Suenaga , Oiwa Yutaka , Eijiro Sumii , Akinori Yonezawa The Interface Definition Language for Fail-Safe C. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:192-208 [Conf ] Matthew Harren , George C. Necula Lightweight Wrappers for Interfacing with Binary Code in CCured. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:209-225 [Conf ] Akira Mori Detecting Unknown Computer Viruses - A New Approach. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:226-241 [Conf ] Hirotake Abe , Kazuhiko Kato Security Policy Descriptions Through the Use of Control Structure of a Target Program. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:242-261 [Conf ] Yasushi Shinjo , Yoshinori Nakata , Kozo Itano Securing RPC with a Reference Monitor for System Calls. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:262-280 [Conf ] Osamu Sato , Richard Potter , Mitsuharu Yamamoto , Masami Hagiya UML Scrapbook and Realization of Snapshot Programming Environment. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:281-295 [Conf ] David P. Gilliam Managing Information Technology Security Risk. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:296-317 [Conf ] Fabrizio Baiardi , Alessandro Falleni , Riccardo Granchi , Fabio Martinelli , Marinella Petrocchi , Anna Vaccarelli SEAS: A Secure E-Voting Applet System. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:318-329 [Conf ] Hiroyuki Nishiyama , Yukinobu Mine , Fumio Mizoguchi The Design of a Secure Distributed Devices System Based on Immunity. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:330-344 [Conf ]