|
Conferences in DBLP
A Policy Model for Secure Information Flow. [Citation Graph (, )][DBLP]
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference. [Citation Graph (, )][DBLP]
Validating Security Protocols under the General Attacker. [Citation Graph (, )][DBLP]
Usage Automata. [Citation Graph (, )][DBLP]
Static Detection of Logic Flaws in Service-Oriented Applications. [Citation Graph (, )][DBLP]
Improving the Semantics of Imperfect Security. [Citation Graph (, )][DBLP]
Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. [Citation Graph (, )][DBLP]
Transformations between Cryptographic Protocols. [Citation Graph (, )][DBLP]
Formal Validation of OFEPSP+ with AVISPA. [Citation Graph (, )][DBLP]
On the Automated Correction of Protocols with Improper Message Encoding. [Citation Graph (, )][DBLP]
Finite Models in FOL-Based Crypto-Protocol Verification. [Citation Graph (, )][DBLP]
Towards a Type System for Security APIs. [Citation Graph (, )][DBLP]
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. [Citation Graph (, )][DBLP]
How Many Election Officials Does It Take to Change an Election? [Citation Graph (, )][DBLP]
|