ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
Latest Publications
TOTAL DOCUMENTS
25
(FIVE YEARS 0)
H-INDEX
13
(FIVE YEARS 0)
Published By IEEE Comput. Soc
0769506712
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Panel: foundations for intrusion detection
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856929
◽
2005
◽
Cited By ~ 1
Author(s):
T.F. Lunt
Keyword(s):
Intrusion Detection
Download Full-text
Probabilistic noninterference for multi-threaded programs
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856937
◽
2002
◽
Cited By ~ 114
Author(s):
A. Sabelfeld
◽
D. Sands
Download Full-text
Secure composition of untrusted code: wrappers and causality types
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856943
◽
2002
◽
Cited By ~ 14
Author(s):
P. Sewell
◽
J. Vitek
Keyword(s):
Untrusted Code
Download Full-text
Looking for diamonds in the desert - extending automatic protocol generation to three-party authentication and key agreement protocols
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856926
◽
2002
◽
Cited By ~ 22
Author(s):
A. Perrig
◽
D. Song
Keyword(s):
Key Agreement
◽
Authentication And Key Agreement
◽
Agreement Protocols
Download Full-text
Possibilistic definitions of security-an assembly kit
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856936
◽
2002
◽
Cited By ~ 60
Author(s):
H. Mantel
Download Full-text
Relating strands and multiset rewriting for security protocol analysis
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856924
◽
2002
◽
Cited By ~ 20
Author(s):
I. Cervesato
◽
N. Durgin
◽
J. Mitchell
◽
P. Lincoln
◽
A. Scedrov
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Optimizing protocol rewrite rules of CIL specifications
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856925
◽
2002
◽
Cited By ~ 3
Author(s):
G. Denker
◽
J.K. Millen
◽
A. Grau
◽
J. Kuster Filipe
Keyword(s):
Rewrite Rules
Download Full-text
Protocol independence through disjoint encryption
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856923
◽
2002
◽
Cited By ~ 39
Author(s):
J.D. Guttman
◽
F.J.F. Thayer
Download Full-text
Lorenz and Colossus [military cryptography]
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856938
◽
2002
◽
Author(s):
A.E. Sale
Download Full-text
Invariant generation techniques in cryptographic protocol analysis
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856934
◽
2002
◽
Cited By ~ 6
Author(s):
C. Meadows
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Invariant Generation
◽
Cryptographic Protocol Analysis
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close