|
Conferences in DBLP
Semantics and Enforcement of Expressive Information Flow Policies. [Citation Graph (, )][DBLP]
An Algebra for Trust Dilution and Trust Fusion. [Citation Graph (, )][DBLP]
HMM-Based Trust Model. [Citation Graph (, )][DBLP]
Deriving Trust from Experience. [Citation Graph (, )][DBLP]
Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties. [Citation Graph (, )][DBLP]
Model Checking of Security-Sensitive Business Processes. [Citation Graph (, )][DBLP]
Analysing the Information Flow Properties of Object-Capability Patterns. [Citation Graph (, )][DBLP]
Applied Quantitative Information Flow and Statistical Databases. [Citation Graph (, )][DBLP]
Specification and Verification of Side Channel Declassification. [Citation Graph (, )][DBLP]
Secure Information Flow for Distributed Systems. [Citation Graph (, )][DBLP]
Probable Innocence in the Presence of Independent Knowledge. [Citation Graph (, )][DBLP]
A Calculus of Trustworthy Ad Hoc Networks. [Citation Graph (, )][DBLP]
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties. [Citation Graph (, )][DBLP]
Game-Based Verification of Multi-Party Contract Signing Protocols. [Citation Graph (, )][DBLP]
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. [Citation Graph (, )][DBLP]
Trusted Multiplexing of Cryptographic Protocols. [Citation Graph (, )][DBLP]
Specifying and Modelling Secure Channels in Strand Spaces. [Citation Graph (, )][DBLP]
Integrating Automated and Interactive Protocol Verification. [Citation Graph (, )][DBLP]
A User Interface for a Game-Based Protocol Verification Tool. [Citation Graph (, )][DBLP]
|