Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ankur Taly, Asim Shankar |
Distributed Authorization in Vanadium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures, pp. 139-162, 2016, Springer, 978-3-319-43004-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Pascal Berrang, Praveen Manoharan 0001 |
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures, pp. 87-138, 2016, Springer, 978-3-319-43004-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Andrei Sabelfeld |
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures, pp. 32-86, 2016, Springer, 978-3-319-43004-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth |
Efficient Zero-Knowledge Proof Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures, pp. 1-31, 2016, Springer, 978-3-319-43004-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Javier López 0001, Fabio Martinelli (eds.) |
Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 978-3-319-43004-1 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Javier López 0001, Fabio Martinelli (eds.) |
Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 978-3-319-10081-4 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Bernhard, Bogdan Warinschi |
Cryptographic Voting - A Gentle Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 167-211, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Blanchet |
Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 54-87, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bürger 0001, Jan Jürjens, Thomas Ruhroth, Stefan Gärtner 0001, Kurt Schneider |
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 34-53, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Pierangela Samarati |
Encryption and Fragmentation for Data Confidentiality in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 212-243, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ruben Rios, Javier López 0001, Jorge Cuéllar |
Location Privacy in WSNs: Solutions, Challenges, and Future Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 244-282, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fabrice Bouquet, Fabien Peureux, Fabrice Ambert |
Model-Based Testing for Functional and Security Test Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 1-33, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Willem De Groef, Dominique Devriese, Mathy Vanhoef, Frank Piessens |
Information Flow Control for Web Scripts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 124-145, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis |
Defensive JavaScript - Building and Verifying Secure Web Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 88-123, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, François Dupressoir, Benjamin Grégoire, César Kunz, Benedikt Schmidt, Pierre-Yves Strub |
EasyCrypt: A Tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp. 146-166, 2013, Springer, 978-3-319-10081-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi |
Quantitative Information Flow and Applications to Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 211-230, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yudistira Asnar, Fabio Massacci |
A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 152-184, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Gorrieri, Matteo Vernali |
On Intransitive Non-interference in Some Models of Concurrency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 125-151, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati |
Protecting Privacy in Data Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 1-34, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen |
Risk Analysis of Changing and Evolving Systems Using CORAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 231-274, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Flaminia L. Luccio, Graham Steel |
An Introduction to Security API Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 35-65, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania, Gonzalo Ortiz, Javier Valdazo |
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 101-124, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio |
The Geometry of Lattice Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 185-210, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Cédric Fournet, Karthikeyan Bhargavan, Andrew D. Gordon 0001 |
Cryptographic Verification by Typing for a Sample Protocol Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures, pp. 66-100, 2011, Springer, 978-3-642-23081-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Roberto Gorrieri (eds.) |
Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 978-3-642-23081-3 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Luca Viganò 0001 |
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 166-194, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Elvira Albert, Puri Arenas, Samir Genaim, Germán Puebla, Damiano Zanardini |
Resource Usage Analysis and Its Application to Resource Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 258-288, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.) |
Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 978-3-642-03828-0 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Javier López 0001, Rodrigo Roman, Cristina Alcaraz |
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 289-338, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | K. Rustan M. Leino, Peter Müller 0001, Jan Smans |
Verification of Concurrent Programs with Chalice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 195-222, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Besson, David Cachera, Thomas P. Jensen, David Pichardie |
Certified Static Analysis by Abstract Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 223-257, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi |
Logic in Access Control (Tutorial Notes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 145-165, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, César Kunz |
An Introduction to Certificate Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 51-95, 2008, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bart Jacobs 0001, Wolter Pieters |
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 121-144, 2008, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David W. Chadwick |
Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 96-120, 2008, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity Management, Federations, Shibboleth, CardSpace |
1 | Daniel Le Métayer |
IT Security Analysis Best Practices and Formal Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 75-91, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Paolo Mori |
Enhancing Java Security with History Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 135-159, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Javier López 0001, Cristina Alcaraz, Rodrigo Roman |
On the Protection and Technologies of Critical Information Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 160-182, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Roberto Gorrieri (eds.) |
Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 978-3-540-74809-0 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 1-50, 2007, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002 |
An Interpretation of Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 183-208, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi |
Security Protocols: Principles and Calculi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 1-23, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang |
Trust and Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 209-245, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Úlfar Erlingsson |
Low-Level Software Security: Attacks and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 92-134, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari 0002, Roberto Zunino |
Secure Service Orchestration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 24-74, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Eimear Gallery, Chris J. Mitchell |
Trusted Mobile Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 282-323, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough |
An Introduction to the Role Based Trust Management Framework RT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, pp. 246-281, 2007, Springer, 978-3-540-74809-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli (eds.) |
Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 3-540-28955-0 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Giorgini, Fabio Massacci, Nicola Zannone |
Security and Trust Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 237-272, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Ji-Won Byun, Ninghui Li |
Privacy-Preserving Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 178-206, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Debar, Jouni Viinikka |
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 207-236, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Guillaume Dufay |
Formal Methods for Smartcard Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 133-177, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Justifying a Dolev-Yao Model Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 1-41, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | François Koeune, François-Xavier Standaert |
A Tutorial on Physical Security and Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 78-108, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jürjens |
Model-Based Security Engineering with UML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 42-77, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Roberto Gorrieri (eds.) |
Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 3-540-20955-7 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi |
Static Analysis of Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 109-132, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli |
Classification of Security Properties - Part II: Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 139-185, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz |
Security for Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 207-265, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Aldini, Mario Bravetti, Alessandra Di Pierro, Roberto Gorrieri, Chris Hankin, Herbert Wiklicky |
Two Formal Approaches for Approximating Noninterference Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 1-43, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro |
Cryptographic Algorithms for Multimedia Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 186-206, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Riccardo Focardi, Vladimiro Sassone |
A Survey of Name-Passing Calculi and Crypto-Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 91-138, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Paolo D'Arco |
The Key Establishment Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 44-90, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Roberto Gorrieri (eds.) |
Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000] ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![Springer, 3-540-42896-8 The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson, Iliano Cervesato |
The Logic of Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 63-136, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Peter Y. A. Ryan |
Mathematical Models of Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 1-62, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Joshua D. Guttman |
Security Goals: Packet Trajectories and Strand Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 197-261, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Andrew D. Gordon 0001 |
Notes on Nominal Calculi for Security and Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 262-330, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Pierangela Samarati, Sabrina De Capitani di Vimercati |
Access Control: Policies, Models, and Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 137-196, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Roberto Gorrieri |
Classification of Security Properties (Part I: Information Flow). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 331-396, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|