The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG 1.7 Publications (ifip1-7)
2009 (conf/ifip1-7/2009wits)


  1. A Policy Model for Secure Information Flow. [Citation Graph (, )][DBLP]


  2. A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference. [Citation Graph (, )][DBLP]


  3. Validating Security Protocols under the General Attacker. [Citation Graph (, )][DBLP]


  4. Usage Automata. [Citation Graph (, )][DBLP]


  5. Static Detection of Logic Flaws in Service-Oriented Applications. [Citation Graph (, )][DBLP]


  6. Improving the Semantics of Imperfect Security. [Citation Graph (, )][DBLP]


  7. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. [Citation Graph (, )][DBLP]


  8. Transformations between Cryptographic Protocols. [Citation Graph (, )][DBLP]


  9. Formal Validation of OFEPSP+ with AVISPA. [Citation Graph (, )][DBLP]


  10. On the Automated Correction of Protocols with Improper Message Encoding. [Citation Graph (, )][DBLP]


  11. Finite Models in FOL-Based Crypto-Protocol Verification. [Citation Graph (, )][DBLP]


  12. Towards a Type System for Security APIs. [Citation Graph (, )][DBLP]


  13. Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. [Citation Graph (, )][DBLP]


  14. How Many Election Officials Does It Take to Change an Election? [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002