|
Conferences in DBLP
Committees. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:- [Conf]
Preface. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:- [Conf]
- Peng Li, Steve Zdancewic
Practical Information-flow Control in Web-Based Information Systems. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:2-15 [Conf]
- William L. Harrison, James Hook
Achieving Information Flow Security through Precise Control of Effects. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:16-30 [Conf]
- Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider
Belief in Information Flow. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:31-45 [Conf]
- Iliano Cervesato, Catherine Meadows, Dusko Pavlovic
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:48-61 [Conf]
- Martín Abadi, Véronique Cortier
Deciding Knowledge in Security Protocols under (Many More) Equational Theories. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:62-76 [Conf]
- Michael Backes, Markus Dürmuth
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:78-93 [Conf]
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:94-110 [Conf]
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Analysis of Typed Analyses of Authentication Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:112-125 [Conf]
- Rob Delicata, Steve A. Schneider
Temporal Rank Functions for Forward Secrecy. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:126-139 [Conf]
- Xavier Allamigeon, Bruno Blanchet
Reconstruction of Attacks against Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:140-154 [Conf]
- Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
Polynomial Runtime in Simulatability Definitions. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:156-169 [Conf]
- Pedro Adão, Gergei Bana, Andre Scedrov
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:170-184 [Conf]
- Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
Nomad: A Security Model with Non Atomic Actions and Deadlines. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:186-196 [Conf]
- Tian Zhao, John Tang Boyland
Type Annotations to Improve Stack-Based Access Control. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:197-210 [Conf]
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari
Enforcing Secure Service Composition. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:211-223 [Conf]
- Ana Almeida Matos, Gérard Boudol
On Declassification and the Non-Disclosure Policy. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:226-240 [Conf]
- Stephen Chong, Andrew C. Myers
Language-Based Information Erasure. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:241-254 [Conf]
- Andrei Sabelfeld, David Sands
Dimensions and Principles of Declassification. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:255-269 [Conf]
- Lantian Zheng, Andrew C. Myers
End-to-End Availability Policies and Noninterference. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:272-286 [Conf]
- Ajay Mahimkar, Vitaly Shmatikov
Game-Based Analysis of Denial-of-Service Prevention Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:287-301 [Conf]
|