The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSFW"( http://dblp.L3S.de/Venues/CSFW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
1988 (17) 1989 (16) 1990 (18) 1991 (31) 1992 (19) 1993 (16) 1994 (20) 1995 (17) 1996 (21) 1997 (20) 1998 (20) 1999 (20) 2000 (24) 2001 (23) 2002 (24) 2003 (18) 2004 (21) 2005 (23) 2006 (26)
Publication types (Num. hits)
inproceedings(375) proceedings(19)
Venues (Conferences, Journals, ...)
CSFW(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 262 occurrences of 150 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Riccardo Pucella, Fred B. Schneider Independence From Obfuscation: A Semantic Framework for Dive. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Krishnendu Chatterjee, Radha Jagadeesan, Corin Pitcher Games for Controls. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shai Rubin, Somesh Jha, Barton P. Miller On the Completeness of Attack Mutation Algorithms. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stéphanie Delaune, Steve Kremer, Mark Ryan 0001 Coercion-Resistance and Receipt-Freeness in Electronic Voting. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Antonio Lain, Miranda Mowbray Distributed Authorization Using Delegation with Acyclic Paths. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stephen Chong, Andrew C. Myers Decentralized Robustness. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Christoph Sprenger 0001, Michael Backes 0001, David A. Basin, Birgit Pfitzmann, Michael Waidner Cryptographically Sound Theorem Proving. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Keith M. Martin, Peter R. Wild On Key Assignment for Hierarchical Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marieke Huisman, Pratik Worah, Kim Sunesen A Temporal Logic Characterisation of Observational Determinism. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Peng Li, Steve Zdancewic Encoding Information Flow in Haskell. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael J. May, Carl A. Gunter, Insup Lee 0001 Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Daniel Hedin, David Sands 0001 Noninterference in the Presence of Non-Opaque Pointers. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi Computationally Sound Compositional Logic for Key Exchange Protocols. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Avik Chaudhuri, Martín Abadi Secrecy by Typing and File-Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon 0001, Stephen Tse Verified Interoperable Implementations of Security Protocols. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alejandro Russo, Andrei Sabelfeld Securing Interaction between Threads and the Scheduler. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hongbin Zhou, Simon N. Foley A Framework for Establishing Decentralized Secure Coalitions. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 Policy Analysis for Administrative Role Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari 0002 Types and Effects for Secure Service Orchestration. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ralf Küsters Simulation-Based Security with Inexhaustible Interactive Turing Machines. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kim-Kwang Raymond Choo Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  BibTeX  RDF
1Aybek Mukhamedov, Mark Dermot Ryan Resolve-Impossibility for a Contract-Signing Protocol. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong Information-Flow Security for Interactive Programs. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Deepak Garg 0001, Frank Pfenning Non-Interference in Constructive Authorization Logic. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nikhil Swamy, Michael Hicks 0001, Stephen Tse, Steve Zdancewic Managing Policy Updates in Security-Typed Languages. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lantian Zheng, Andrew C. Myers End-to-End Availability Policies and Noninterference. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  BibTeX  RDF
1Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh Polynomial Runtime in Simulatability Definitions. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reactive simulatability, universal composability, multi-party computation
1Pedro Adão, Gergei Bana, Andre Scedrov Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani Compositional Analysis of Contract Signing Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Committees. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rob Delicata, Steve A. Schneider Temporal Rank Functions for Forward Secrecy. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ana Almeida Matos, Gérard Boudol On Declassification and the Non-Disclosure Policy. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Andrei Sabelfeld, David Sands 0001 Dimensions and Principles of Declassification. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari 0002 Enforcing Secure Service Composition. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Peng Li, Steve Zdancewic Practical Information-flow Control in Web-Based Information Systems. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Martín Abadi, Véronique Cortier Deciding Knowledge in Security Protocols under (Many More) Equational Theories. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michele Bugliesi, Riccardo Focardi, Matteo Maffei Analysis of Typed Analyses of Authentication Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Iliano Cervesato, Catherine Meadows 0001, Dusko Pavlovic An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans Nomad: A Security Model with Non Atomic Actions and Deadlines. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1William L. Harrison, James Hook Achieving Information Flow Security through Precise Control of Effects. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Preface. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ajay Mahimkar, Vitaly Shmatikov Game-Based Analysis of Denial-of-Service Prevention Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tian Zhao, John Tang Boyland Type Annotations to Improve Stack-Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stephen Chong, Andrew C. Myers Language-Based Information Erasure. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xavier Allamigeon, Bruno Blanchet Reconstruction of Attacks against Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Markus Dürmuth A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider Belief in Information Flow. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic Enforcing Robust Declassification. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kaijun Tan, Jason Crampton, Carl A. Gunter The Consistency of Task-Based Authorization Constraints in Workflow Systems. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Stéphanie Delaune, Florent Jacquemard A Theory of Dictionary Attacks and its Complexity. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  BibTeX  RDF
1Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic Abstraction and Refinement in Protocol Derivation. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Magnus Almgren, Erland Jonsson Using Active Learning in Intrusion Detection. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, active learning
1Moritz Y. Becker, Peter Sewell Cassandra: Flexible Trust Management, Applied to Electronic Health Records. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Annalisa Bossi, Carla Piazza, Sabina Rossi Modelling Downgrading in Information Flow Security. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rohit Chadha, Steve Kremer, Andre Scedrov Formal Analysis of Multi-Party Contract Signing. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zhenyue Deng, Geoffrey Smith 0001 Lenient Array Operations for Practical Secure Information Flow. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk Secure Information Flow by Self-Composition. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joseph Y. Halpern, Vicky Weissman A Formal Foundation for XrML. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon 0001 From Stack Inspection to Access Control: A Security Analysis for Libraries. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ran Canetti Universally Composable Signature, Certification, and Authentication. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ron van der Meyden, Kaile Su Symbolic Model Checking the Knowledge of the Dining Cryptographers. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Olivier Pereira, Jean-Jacques Quisquater Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hubie Chen, Stephen Chong Owned Policies for Information Security. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Nathan Whitehead, Martín Abadi, George C. Necula By Reason and Authority: A System for Authorization of Proof-Carrying Code. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Sylvain Gombault, Thierry Sans Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDMEF, counter-measures, anti-correlation, Intrusion detection, correlation, response
1Chiara Braghin, Daniele Gorla, Vladimiro Sassone A Distributed Calculus for Ro^le-Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tom Chothia, Dominic Duggan, Jan Vitek Type-Based Distributed Access Control. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 A Procedure for Verifying Security Against Type Confusion Attacks. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Geoffrey Smith 0001 Probabilistic Noninterference through Weak Probabilistic Bisimulation. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ninghui Li, John C. Mitchell Understanding SPKI/SDSI Using First-Order Logic. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Bogdan Warinschi A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Caroline Kudla Identity Based Authenticated Key Agreement Protocols from Pairings. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Joseph Y. Halpern, Vicky Weissman Using First-Order Logic to Reason about Policies. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  BibTeX  RDF
1Jonathan C. Herzog The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Anindya Banerjee 0001, David A. Naumann Using Access Control for Secure Information Flow in a Java-like Language. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jonathan K. Millen, Vitaly Shmatikov Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Steve Zdancewic, Andrew C. Myers Observational Determinism for Concurrent Program Security. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Joseph Y. Halpern, Kevin R. O'Neill Anonymity and Information Hiding in Multiagent Systems. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Philippa J. Broadfoot, Gavin Lowe On Distributed Security Transactions that Use Secure Transport Protocols. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi Secure Contexts for Confidential Data. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine On Generalized Authorization Problems. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic A Derivation System for Security Protocols and its Logical Formalization. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson Automatic Validation of Protocol Narration. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Günter Karjoth, Matthias Schunter A Privacy Policy Model for Enterprises. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Andrew D. Gordon 0001, Alan Jeffrey Types and Effects for Asymmetric Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Vitaly Shmatikov Probabilistic Analysis of Anonymity. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI
1James Heather Strand Spaces and Rank Functions: More than Distant Cousins. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1François Pottier A Simple View of Type-Secure Information Flow in the p-Calculus. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky Approximate Non-Interference. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Gavin Lowe Quantifying Information Flow. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Philippa J. Broadfoot, A. W. Roscoe 0001 Capturing Parallel Attacks within the Data Independence Framework. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun A Formal Analysis of Syverson?s Rational Exchange Protocol. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Oleg Sheyner, Jeannette M. Wing Two Formal Analys s of Attack Graphs. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Nicholas Tran Hiding Functions and Computational Security of Image Watermarking Systems. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Steve Kremer, Jean-François Raskin Game Analysis of Abuse-free Contract Signing. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 394 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license