The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
2005 (conf/csfw/2005)


  1. Committees. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:- [Conf]

  2. Preface. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:- [Conf]
  3. Peng Li, Steve Zdancewic
    Practical Information-flow Control in Web-Based Information Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:2-15 [Conf]
  4. William L. Harrison, James Hook
    Achieving Information Flow Security through Precise Control of Effects. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:16-30 [Conf]
  5. Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider
    Belief in Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:31-45 [Conf]
  6. Iliano Cervesato, Catherine Meadows, Dusko Pavlovic
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:48-61 [Conf]
  7. Martín Abadi, Véronique Cortier
    Deciding Knowledge in Security Protocols under (Many More) Equational Theories. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:62-76 [Conf]
  8. Michael Backes, Markus Dürmuth
    A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:78-93 [Conf]
  9. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:94-110 [Conf]
  10. Michele Bugliesi, Riccardo Focardi, Matteo Maffei
    Analysis of Typed Analyses of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:112-125 [Conf]
  11. Rob Delicata, Steve A. Schneider
    Temporal Rank Functions for Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:126-139 [Conf]
  12. Xavier Allamigeon, Bruno Blanchet
    Reconstruction of Attacks against Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:140-154 [Conf]
  13. Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
    Polynomial Runtime in Simulatability Definitions. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:156-169 [Conf]
  14. Pedro Adão, Gergei Bana, Andre Scedrov
    Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:170-184 [Conf]
  15. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Nomad: A Security Model with Non Atomic Actions and Deadlines. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:186-196 [Conf]
  16. Tian Zhao, John Tang Boyland
    Type Annotations to Improve Stack-Based Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:197-210 [Conf]
  17. Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari
    Enforcing Secure Service Composition. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:211-223 [Conf]
  18. Ana Almeida Matos, Gérard Boudol
    On Declassification and the Non-Disclosure Policy. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:226-240 [Conf]
  19. Stephen Chong, Andrew C. Myers
    Language-Based Information Erasure. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:241-254 [Conf]
  20. Andrei Sabelfeld, David Sands
    Dimensions and Principles of Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:255-269 [Conf]
  21. Lantian Zheng, Andrew C. Myers
    End-to-End Availability Policies and Noninterference. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:272-286 [Conf]
  22. Ajay Mahimkar, Vitaly Shmatikov
    Game-Based Analysis of Denial-of-Service Prevention Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:287-301 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002