The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
2003 (conf/spw/2003)

  1. Bruce Christianson
    Where Have All the Protocols Gone? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:1-2 [Conf]
  2. Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
    A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:3-10 [Conf]
  3. Giampaolo Bella
    A Protocol's Life After Attacks... (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:11-18 [Conf]
  4. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Towards Flexible Credential Negotiation Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:19-23 [Conf]
  5. Pierangela Samarati
    Towards Flexible Credential Negotiation Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:24-27 [Conf]
  6. N. Asokan, Valtteri Niemi, Kaisa Nyberg
    Man-in-the-Middle in Tunnelled Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:28-41 [Conf]
  7. N. Asokan
    Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:42-48 [Conf]
  8. Simon N. Foley, Hongbin Zhou
    Towards a Framework for Autonomic Security Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:49-54 [Conf]
  9. Simon N. Foley
    Towards a Framework for Autonomic Security Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:55-62 [Conf]
  10. Geraint Price
    Client v. Server Side Protocols, Interfaces and Storage. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:63-73 [Conf]
  11. Geraint Price
    Client v. Server Side Protocols, Interfaces and Storage (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:74-79 [Conf]
  12. Virgil D. Gligor
    Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:80-96 [Conf]
  13. Virgil D. Gligor
    Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:97-105 [Conf]
  14. Hassen Saïdi, Victoria Stavridou, Bruno Dutertre
    Protocol Codesign. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:106-113 [Conf]
  15. Victoria Stavridou
    Protocol Codesign (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:114-118 [Conf]
  16. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman
    Enforcing Security Policies for Distributed Objects Applications. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:119-130 [Conf]
  17. Bogdan C. Popescu
    Enforcing Security Policies for Distributed Objects Applications (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:131-133 [Conf]
  18. Mads Dam
    Regular SPKI. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:134-150 [Conf]
  19. Mads Dam
    Regular SPKI (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:151-152 [Conf]
  20. Birgit Pfitzmann, Michael Waidner
    Federated Identity-Management Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:153-174 [Conf]
  21. Birgit Pfitzmann
    Federated Identity-Management Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:175-177 [Conf]
  22. Peter Y. A. Ryan
    Enforcing the Unenforceable. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:178-182 [Conf]
  23. Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
    Is the Verification Problem for Cryptographic Protocols Solved?. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:183-189 [Conf]
  24. Bruce Christianson, Michael Roe, David Wheeler
    Secure Sessions from Weak Secrets. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:190-205 [Conf]
  25. Bruce Christianson
    Secure Sessions from Weak Secrets (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:206-212 [Conf]
  26. Michael Roe
    Panel Session: Is Protocol Modelling Finished? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:213-217 [Conf]
  27. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin
    WAR: Wireless Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:218-232 [Conf]
  28. Matt Blaze
    WAR: Wireless Anonymous Routing (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:233-240 [Conf]
  29. Jari Arkko, Pekka Nikander
    Limitations of IPsec Policy Mechanisms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:241-251 [Conf]
  30. Jari Arkko
    Limitations of IPsec Policy Mechanisms (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:252-254 [Conf]
  31. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Deniable Authenticated Key Establishment for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:255-271 [Conf]
  32. Wenbo Mao
    Deniable Authenticated Key Establishment for Internet Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:272-273 [Conf]
  33. Mike Burmester, Alec Yasinsac
    Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:274-282 [Conf]
  34. Alec Yasinsac
    Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:283-287 [Conf]
  35. Ross J. Anderson
    What We Can Learn from API Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:288-300 [Conf]
  36. Kamil Kulesza, Zbigniew Kotulski
    Addressing New Challenges by Building Security Protocols Around Graphs. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:301-306 [Conf]
  37. Brian Monahan
    From Security Protocols to Systems Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:307-322 [Conf]
  38. Brian Monahan
    From Security Protocols to Systems Security (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:323-323 [Conf]
  39. Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
    Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:324-332 [Conf]
  40. Fabio Martinelli
    Biometrics to Enhance Smartcard Security (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:333-335 [Conf]
  41. James A. Malcolm
    Blind Publication: A Copyright Library without Publication or Trust. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:336-340 [Conf]
  42. James A. Malcolm
    Blind Publication: A Copyright Library Without Publication or Trust (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:341-349 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002