|
Conferences in DBLP
- Peter Y. A. Ryan
Mathematical Models of Computer Security. [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:1-62 [Conf]
- Paul F. Syverson, Iliano Cervesato
The Logic of Authentication Protocols. [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:63-136 [Conf]
- Pierangela Samarati, Sabrina De Capitani di Vimercati
Access Control: Policies, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:137-196 [Conf]
- Joshua D. Guttman
Security Goals: Packet Trajectories and Strand Spaces. [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:197-261 [Conf]
- Andrew D. Gordon
Notes on Nominal Calculi for Security and Mobility. [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:262-330 [Conf]
- Riccardo Focardi, Roberto Gorrieri
Classification of Security Properties (Part I: Information Flow). [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:331-396 [Conf]
|