The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
1998 (conf/spw/1998)

  1. Lawrence C. Paulson
    Inductive Analysis of the Internet Protocol TLS (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:1-12 [Conf]
  2. Lawrence C. Paulson
    Inductive Analysis of the Internet Protocol TLS (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:13-23 [Conf]
  3. Simon N. Foley
    External Consistency and the Verification of Security Protocols (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:24-27 [Conf]
  4. Simon N. Foley
    External Consistency and the Verification of Security Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:28-35 [Conf]
  5. Carl M. Ellison
    The Trust Shell Game (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:36-40 [Conf]
  6. Carl M. Ellison
    The Trust Shell Game (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:41-44 [Conf]
  7. Joan Feigenbaum
    Overview of the AT&T Labs Trust-Management Project (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:45-50 [Conf]
  8. Joan Feigenbaum
    Overview of the AT&T Labs Trust-Management Project (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:51-58 [Conf]
  9. Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:59-63 [Conf]

  10. Discussion Session - Trust Management. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:64-63 [Conf]
  11. Virgil D. Gligor, Serban I. Gavrila
    Application-Oriented Security Policies and Their Composition (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:67-74 [Conf]
  12. Virgil D. Gligor
    Application-Oriented Security Policies and Their Composition (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:75-82 [Conf]
  13. Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi
    Secure Fingerprinting Using Public-Key Cryptography (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:83-89 [Conf]
  14. Ryôichi Sasaki
    Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:90-94 [Conf]
  15. Francesco Bergadano, P. De Mauro
    Third Party Certification of HTTP Service Access Statistics (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:95-99 [Conf]
  16. Francesco Bergadano
    Third Party Certification of HTTP Service Access Statistics (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:100-107 [Conf]
  17. William S. Harbison
    Delegating Trust (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:108-117 [Conf]
  18. Bruno Crispo
    Delegation of Responsibility (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:118-124 [Conf]
  19. Bruno Crispo
    Delegation of Responsibility (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:125-130 [Conf]
  20. T. Mark A. Lomas
    Abuse of Process (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:131-136 [Conf]
  21. Peter Landrock
    A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:137-145 [Conf]
  22. Peter Landrock
    A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:146-153 [Conf]
  23. Bruce Christianson, James A. Malcolm
    Delegation and Not-So Smart Cards (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:154-157 [Conf]
  24. Bruce Christianson
    Delegation and Not-So Smart Card (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:158-167 [Conf]
  25. Michael Roe
    Certification and Delegation (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:168-176 [Conf]
  26. Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne
    Discussion Session: Differences Between Academic and Commercial Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:177-192 [Conf]
  27. Raphael Yahalom
    Optimistic Trust with Realistic eNvestigators (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:193-202 [Conf]
  28. Raphael Yahalom
    Optimistic Trust with Realistic eNvestigators (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:203-212 [Conf]
  29. Dieter Gollmann
    Insider Fraud (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:213-219 [Conf]
  30. Dieter Gollmann
    Insider Fraud (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:220-226 [Conf]
  31. Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson
    Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:227-239 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002