The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase key-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2005 (19) 2006-2007 (15) 2008-2011 (18) 2013-2016 (19) 2017-2019 (15) 2020-2024 (13)
Publication types (Num. hits)
article(40) inproceedings(58) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41 occurrences of 40 keywords

Results
Found 99 publication records. Showing 99 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
90Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
42Robert Law Using student blogs for documentation in software development projects. Search on Bibsonomy ITiCSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
42Patrick Bas, François Cayre Achieving subspace or key security for WOA using natural or circular watermarking. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WOA, circular watermarking, key-security, natural watermarking, subspace-security, watermarking
28Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon On the Security of the Canetti-Krawczyk Model. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23François Cayre, Patrick Bas Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
21Hongji Wang, Gang Yao, Qingshan Jiang An Identity-Based Group Key Agreement Protocol from Pairing. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18John A. Trono Comments on "Tagged Semaphores". Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Michael Backes 0001, Markus Dürmuth, Dominique Unruh OAEP Is Secure under Key-Dependent Messages. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key-dependent message security, RSA-OAEP, chosen ciphertext attacks
16Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS
15Win Aye, Mohammad Umar Siddiqi ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Seungjun Baek 0002, Giyoon Kim, Yongjin Jeon, Jongsung Kim Enhancing the Related-Key Security of PIPO Through New Key Schedules. Search on Bibsonomy ICISC (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
15Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Susan Thomson 0001 Public-key cryptography with joint and related-key security. Search on Bibsonomy 2014   RDF
15Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan The Long-Short-Key Primitive and Its Applications to Key Security. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Hualiang Hu, Deren Chen, Changqin Huang Securing role-based distributed collaboration system. Search on Bibsonomy SMC (6) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Lakshmi Sujatha Grandhi, Srimannarayana Grandhi, Santoso Wibowo A Security-UTAUT Framework for Evaluating Key Security Determinants in Smart City Adoption by the Australian City Councils. Search on Bibsonomy SNPD Winter The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Vanesa Daza, Javier Herranz, Germán Sáez On the Computational Security of a Distributed Key Distribution Scheme. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Keith Harrison, Shouhuai Xu Protecting Cryptographic Keys from Memory Disclosure Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic key security, memory disclosure
12Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock On Session Key Construction in Provably-Secure Key Establishment Protocols. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor Managing Risk of IT Security Outsourcing in the Decision-Making Stage. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man Security Considerations in the Design and Implementation of a new DES chip. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
11Dannan Lin, Charles A. Shoniregun, Galyna A. Akmayeva The softphone security. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security. Search on Bibsonomy PDP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Douglas Wikström Designated Confirmer Signatures Revisited. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jie Huang, Jiangyi Yi The key security management scheme of cloud storage based on blockchain and digital twins. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Mina Soltani Siapoush, Jim Alves-Foss Is Formal Verification of seL4 Adequate to Address the Key Security Challenges of Kernel Design? Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
9Song Deng, Qicong Hu, Di Wu 0056, Yi He 0007 BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
9Jörg Schwenk, Douglas Stebila A reduction-based proof for authentication and session key security in three-party Kerberos. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
9RunQi Li Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway. Search on Bibsonomy J. Interconnect. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
9Tsz Hon Yuen, Cong Zhang 0001, Sherman S. M. Chow Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. Search on Bibsonomy ACNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
9 To improve user key security and cloud user region-based resource scheduler using rail fence region-based load balancing algorithm. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
9Feja Lesniewska, Uchenna Daniel Ani, Jeremy M. Watson, Madeline Carr The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief). Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
9Guma Ali, Mussa Ally Dida, Anael Elikana Sam Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda. Search on Bibsonomy Inf. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
9Weilong Wang, Xiangdong Meng, Yangyang Fei, Zhi Ma Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
9Wenqi Yu, Yuqing Zhao, Chun Guo 0002 Provable Related-Key Security of Contracting Feistel Networks. Search on Bibsonomy Inscrypt The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
9Chun Guo 0002 Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
9Jörg Schwenk, Douglas Stebila A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
9Da-Zhi Sun, Li Sun On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
9Srimannarayana Grandhi, Santoso Wibowo, Prasanna Balasooriya Sec-HOTE-Fit Framework for Assessing Key Security Determinants in Cloud Computing Adoption. Search on Bibsonomy PACIS The full citation details ... 2019 DBLP  BibTeX  RDF
9Richard M. Marzan, Ariel M. Sison An Enhanced Key Security of Playfair Cipher Algorithm. Search on Bibsonomy ICSCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
9Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. Search on Bibsonomy J. Cryptol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
9Chun Guo 0002 Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
9Pratik Soni, Stefano Tessaro Naor-Reingold Goes Public: The Complexity of Known-key Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
9Ashwin Jha, Mridul Nandi Applications of H-Technique: Revisiting Symmetric Key Security Analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
9Pratik Soni, Stefano Tessaro Naor-Reingold Goes Public: The Complexity of Known-Key Security. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
9Atul Luykx, Bart Mennink, Kenneth G. Paterson Analyzing Multi-Key Security Degradation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
9Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim Human-readable Proof of the Related-Key Security of AES-128. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
9Atul Luykx, Bart Mennink, Kenneth G. Paterson Analyzing Multi-key Security Degradation. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
9Anass Misbah, Ahmed Ettalbi Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure. Search on Bibsonomy IBICA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
9Stephen Rodriguez, Paolina Centonze Dynamic Encryption Key Security Scheme (DEKSS) for Mobile and Cloud Systems. Search on Bibsonomy MOBILESoft@ICSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
9Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani Enhanced Public Key Security for the McEliece Cryptosystem. Search on Bibsonomy J. Cryptol. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
9Jianwei Liu 0001, Weiran Liu, Qianhong Wu, Dawei Li, Shigang Chen Survey on key security technologies for space information networks. Search on Bibsonomy J. Commun. Inf. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
9Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim Human-readable Proof of the Related-Key Security of AES-128. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
9Benoît Cogliati, Yannick Seurin Strengthening the Known-Key Security Notion for Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
9Benoît Cogliati, Yannick Seurin Strengthening the Known-Key Security Notion for Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
9Elena Andreeva 0001, Andrey Bogdanov, Bart Mennink Towards Understanding the Known-Key Security of Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
9Michel Abdalla, Fabrice Benhamouda, Alain Passelègue An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
9Nicky Mouha, Atul Luykx Multi-Key Security: The Even-Mansour Construction Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
9Pooya Farshim, Gordon Procter The Related-Key Security of Iterated Even-Mansour Ciphers. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
9Michel Abdalla, Fabrice Benhamouda, Alain Passelègue An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
9Nicky Mouha, Atul Luykx Multi-key Security: The Even-Mansour Construction Revisited. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
9Pooya Farshim, Gordon Procter The Related-Key Security of Iterated Even-Mansour Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
9Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
9Xianhui Lu, Bao Li 0001, Dingding Jia Related-Key Security for Hybrid Encryption. Search on Bibsonomy ISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
9Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. Search on Bibsonomy CRYPTO (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
9Elena Andreeva 0001, Andrey Bogdanov, Bart Mennink Towards Understanding the Known-Key Security of Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
9Wenxue Tan, Jinju Xi, Xiping Wang A RSA Key Security Gradating Algorithm Based on Threshold Attack Time. Search on Bibsonomy J. Softw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
9Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani Enhanced public key security for the McEliece cryptosystem Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
9Sandeep Chowdary Kolli, Maciej J. Zawodniok Energy-efficient multi-key security scheme for wireless sensor network. Search on Bibsonomy LCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9John F. Buford, Rakesh Kumar Analysis of using java card for DRM master key security. Search on Bibsonomy CCNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Yasir Ali, Sean W. Smith Flexible and Scalable Public Key Security for SSH. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Mahdi Abdelguerfi, Burton S. Kaliski Jr., Wayne Patterson Guest Editors' Introduction: Public-Key Security Systems. Search on Bibsonomy IEEE Micro The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
7Kaigui Bian, Jung-Min Park 0001 Security vulnerabilities in IEEE 802.22. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.22, cognitive MAC, incumbent coexistence, self-coexistence, security
7Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim Case Study: Online Banking Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Internet attacks, authentication, case study, phishing, online banking
7Hong Yan 0002, Hui Zhang 0001, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha Information leak vulnerabilities in SIP implementations. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
7Sandeep S. Kumar, Christof Paar Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
7Willi Geiselmann, Rainer Steinwandt Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
5Eleni Kosta, Martin Meints, Marit Hansen, Mark Gasson An analysis of security and privacy issues relating to RFID enabled ePassports. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
5Hafizur Rahaman 0001, Jimson Mathew, Biplab K. Sikdar, Dhiraj K. Pradhan Transition Fault Testability in Bit Parallel Multipliers over GF(2^{m}). Search on Bibsonomy VTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, polynomials, Multipliers, Galois field, error control code, Transition fault, C-testable
5Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy QSHINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
4Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar IPv6 Security Challenges. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
4Edoardo Biagioni, Yingfei Dong, Wesley Peterson, Kazuo Sugihara Practical distributed voter-verifiable secret ballot system. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret ballot, voter verifiable, end-to-end, voting systems
4Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sorin Lerner Staged information flow for javascript. Search on Bibsonomy PLDI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, web applications, confidentiality, flow analysis, set constraints
4Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji SOMA: mutual approval for included content in web pages. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-site request forgery (XSRF), javascript, web security, cross-site scripting (XSS), same origin policy
4David W. Chadwick, Wensheng Xu, Sassa Otenko, Romain Laborde, Bassem Nasser Multi-session Separation of Duties (MSoD) for RBAC. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
4Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg Towards a logical account of declassification. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, aliasing
4Gilles Barthe, Pierre Courtieu, Guillaume Dufay, Simão Melo de Sousa Tool-Assisted Specification and Verification of Typed Low-Level Languages. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF virtual machine, theorem proving, Java Card, bytecode verification
4Douglas Thain Identity Boxing: A New Technique for Consistent Global Identity. Search on Bibsonomy SC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
4Gilles Barthe, Guillaume Dufay A Tool-Assisted Framework for Certified Bytecode Verification. Search on Bibsonomy FASE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
4Martín Abadi, Bruno Blanchet Computer-Assisted Verification of a Protocol for Certified Email. Search on Bibsonomy SAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
4Gilles Barthe, Sorin Stratulat Validation of the JavaCard Platform with Implicit Induction Techniques. Search on Bibsonomy RTA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
4Gilles Barthe, Pierre Courtieu, Guillaume Dufay, Simão Melo de Sousa Tool-Assisted Specification and Verification of the JavaCard Platform. Search on Bibsonomy AMAST The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #99 of 99 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license