The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FOSAD"( http://dblp.L3S.de/Venues/FOSAD )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fosad

Publication years (Num. hits)
2000-2004 (18) 2005-2007 (17) 2008-2011 (20) 2013-2016 (15)
Publication types (Num. hits)
inproceedings(62) proceedings(8)
Venues (Conferences, Journals, ...)
FOSAD(70)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 4 occurrences of 4 keywords

Results
Found 70 publication records. Showing 70 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ankur Taly, Asim Shankar Distributed Authorization in Vanadium. Search on Bibsonomy FOSAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Pascal Berrang, Praveen Manoharan 0001 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy. Search on Bibsonomy FOSAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Andrei Sabelfeld JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript. Search on Bibsonomy FOSAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth Efficient Zero-Knowledge Proof Systems. Search on Bibsonomy FOSAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Javier López 0001, Fabio Martinelli (eds.) Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Javier López 0001, Fabio Martinelli (eds.) Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Bernhard, Bogdan Warinschi Cryptographic Voting - A Gentle Introduction. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jens Bürger 0001, Jan Jürjens, Thomas Ruhroth, Stefan Gärtner 0001, Kurt Schneider Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Pierangela Samarati Encryption and Fragmentation for Data Confidentiality in the Cloud. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ruben Rios, Javier López 0001, Jorge Cuéllar Location Privacy in WSNs: Solutions, Challenges, and Future Trends. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabrice Bouquet, Fabien Peureux, Fabrice Ambert Model-Based Testing for Functional and Security Test Generation. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Willem De Groef, Dominique Devriese, Mathy Vanhoef, Frank Piessens Information Flow Control for Web Scripts. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis Defensive JavaScript - Building and Verifying Secure Web Components. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, François Dupressoir, Benjamin Grégoire, César Kunz, Benedikt Schmidt, Pierre-Yves Strub EasyCrypt: A Tutorial. Search on Bibsonomy FOSAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi Quantitative Information Flow and Applications to Differential Privacy. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yudistira Asnar, Fabio Massacci A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roberto Gorrieri, Matteo Vernali On Intransitive Non-interference in Some Models of Concurrency. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati Protecting Privacy in Data Release. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen Risk Analysis of Changing and Evolving Systems Using CORAS. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Flaminia L. Luccio, Graham Steel An Introduction to Security API Analysis. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania, Gonzalo Ortiz, Javier Valdazo Model-Driven Development of Security-Aware GUIs for Data-Centric Applications. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio The Geometry of Lattice Cryptography. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cédric Fournet, Karthikeyan Bhargavan, Andrew D. Gordon 0001 Cryptographic Verification by Typing for a Sample Protocol Implementation. Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Roberto Gorrieri (eds.) Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim, Luca Viganò 0001 The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Elvira Albert, Puri Arenas, Samir Genaim, Germán Puebla, Damiano Zanardini Resource Usage Analysis and Its Application to Resource Certification. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.) Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Javier López 0001, Rodrigo Roman, Cristina Alcaraz Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1K. Rustan M. Leino, Peter Müller 0001, Jan Smans Verification of Concurrent Programs with Chalice. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frédéric Besson, David Cachera, Thomas P. Jensen, David Pichardie Certified Static Analysis by Abstract Interpretation. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martín Abadi Logic in Access Control (Tutorial Notes). Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, César Kunz An Introduction to Certificate Translation. Search on Bibsonomy FOSAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Bart Jacobs 0001, Wolter Pieters Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. Search on Bibsonomy FOSAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David W. Chadwick Federated Identity Management. Search on Bibsonomy FOSAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity Management, Federations, Shibboleth, CardSpace
1Daniel Le Métayer IT Security Analysis Best Practices and Formal Approaches. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Paolo Mori Enhancing Java Security with History Based Access Control. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Javier López 0001, Cristina Alcaraz, Rodrigo Roman On the Protection and Technologies of Critical Information Infrastructures. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Roberto Gorrieri (eds.) Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002 An Interpretation of Identity-Based Cryptography. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Martín Abadi Security Protocols: Principles and Calculi. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Audun Jøsang Trust and Reputation Systems. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Úlfar Erlingsson Low-Level Software Security: Attacks and Defenses. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari 0002, Roberto Zunino Secure Service Orchestration. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Eimear Gallery, Chris J. Mitchell Trusted Mobile Platforms. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough An Introduction to the Role Based Trust Management Framework RT. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli (eds.) Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Paolo Giorgini, Fabio Massacci, Nicola Zannone Security and Trust Requirements Engineering. Search on Bibsonomy FOSAD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ji-Won Byun, Ninghui Li Privacy-Preserving Database Systems. Search on Bibsonomy FOSAD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hervé Debar, Jouni Viinikka Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. Search on Bibsonomy FOSAD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Guillaume Dufay Formal Methods for Smartcard Security. Search on Bibsonomy FOSAD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1François Koeune, François-Xavier Standaert A Tutorial on Physical Security and Side-Channel Attacks. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jan Jürjens Model-Based Security Engineering with UML. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Roberto Gorrieri (eds.) Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi Static Analysis of Authentication. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli Classification of Security Properties - Part II: Network Security. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz Security for Mobility. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Alessandro Aldini, Mario Bravetti, Alessandra Di Pierro, Roberto Gorrieri, Chris Hankin, Herbert Wiklicky Two Formal Approaches for Approximating Noninterference Properties. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro Cryptographic Algorithms for Multimedia Traffic. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone A Survey of Name-Passing Calculi and Crypto-Primitives. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Paolo D'Arco The Key Establishment Problem. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Roberto Gorrieri (eds.) Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000] Search on Bibsonomy FOSAD The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson, Iliano Cervesato The Logic of Authentication Protocols. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan Mathematical Models of Computer Security. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Security Goals: Packet Trajectories and Strand Spaces. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Andrew D. Gordon 0001 Notes on Nominal Calculi for Security and Mobility. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati, Sabrina De Capitani di Vimercati Access Control: Policies, Models, and Mechanisms. Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Roberto Gorrieri Classification of Security Properties (Part I: Information Flow). Search on Bibsonomy FOSAD The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #70 of 70 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license