ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 12th IEEE Computer Security Foundations Workshop
Latest Publications
TOTAL DOCUMENTS
20
(FIVE YEARS 0)
H-INDEX
11
(FIVE YEARS 0)
Published By IEEE
0769502016
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Safe simplifying transformations for security protocols or not just the Needham Schroeder pubic key protocol
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779760
◽
2003
◽
Author(s):
Mei Lin Hui
◽
G. Lowe
Keyword(s):
Security Protocols
Download Full-text
What is intransitive noninterference?
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779776
◽
2003
◽
Cited By ~ 52
Author(s):
A.W. Roscoe
◽
M.H. Goldsmith
Download Full-text
A meta-notation for protocol analysis
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779762
◽
2003
◽
Cited By ~ 73
Author(s):
I. Cervesato
◽
N.A. Durgin
◽
P.D. Lincoln
◽
J.C. Mitchell
◽
A. Scedrov
Keyword(s):
Protocol Analysis
Download Full-text
A formal framework and evaluation method for network denial of service
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779758
◽
2003
◽
Cited By ~ 54
Author(s):
C. Meadows
Keyword(s):
Evaluation Method
◽
Denial Of Service
◽
Formal Framework
Download Full-text
Authentication via localized names
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779766
◽
2003
◽
Cited By ~ 5
Author(s):
C. Bodei
◽
P. Degano
◽
R. Focardi
◽
C. Priami
Download Full-text
Process algebra and non-interference
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779775
◽
2003
◽
Cited By ~ 59
Author(s):
P.Y.A. Ryan
◽
S.A. Schneider
Keyword(s):
Process Algebra
Download Full-text
I/O automaton models and proofs for shared-key communication systems
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779759
◽
2003
◽
Cited By ~ 17
Author(s):
N. Lynch
Keyword(s):
Communication Systems
◽
Shared Key
Download Full-text
Secure composition of insecure components
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779769
◽
2003
◽
Cited By ~ 18
Author(s):
P. Sewell
◽
J. Vitek
Download Full-text
A logical framework for reasoning on data access control policies
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779772
◽
2003
◽
Cited By ~ 28
Author(s):
E. Bertino
◽
F. Buccafurri
◽
E. Ferrari
◽
P. Rullo
Keyword(s):
Access Control
◽
Data Access
◽
Logical Framework
◽
Control Policies
◽
Data Access Control
◽
Access Control Policies
Download Full-text
Athena: a new efficient automatic checker for security protocol analysis
Proceedings of the 12th IEEE Computer Security Foundations Workshop
◽
10.1109/csfw.1999.779773
◽
2003
◽
Cited By ~ 64
Author(s):
Dawn Xiaodong Song
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close