ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
Latest Publications
TOTAL DOCUMENTS
22
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
0818675225
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
E-Commerce Payment Protocols: Requirements and Analysis
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503692
◽
2005
◽
Cited By ~ 2
Author(s):
S. Zaba
Download Full-text
A Genealogy of Non-Interference
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503700
◽
2005
◽
Author(s):
P.Y.A. Ryan
Download Full-text
How and why feedback composition fails [secure systems]
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503694
◽
2002
◽
Cited By ~ 3
Author(s):
A. Zakinthinos
◽
E.S. Lee
Keyword(s):
Secure Systems
Download Full-text
Specifying a security policy: a case study
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503697
◽
2002
◽
Cited By ~ 19
Author(s):
F. Cuppens
◽
C. Saurel
Keyword(s):
Security Policy
Download Full-text
Language generation and verification in the NRL protocol analyzer
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503690
◽
2002
◽
Cited By ~ 9
Author(s):
C. Meadows
Keyword(s):
Language Generation
◽
Protocol Analyzer
Download Full-text
A HOL extension of GNY for automatically analyzing cryptographic protocols
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503691
◽
2002
◽
Cited By ~ 19
Author(s):
S.H. Brackin
Keyword(s):
Cryptographic Protocols
Download Full-text
Towards a model of storage jamming
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503703
◽
2002
◽
Cited By ~ 22
Author(s):
J. McDermott
◽
D. Goldschlag
Download Full-text
A high-throughput secure reliable multicast protocol
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503686
◽
2002
◽
Cited By ~ 14
Author(s):
D. Malki
◽
M. Reiter
Keyword(s):
High Throughput
◽
Reliable Multicast
◽
Multicast Protocol
Download Full-text
Simmons' protocol is not free of subliminal channels
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503702
◽
2002
◽
Cited By ~ 6
Author(s):
Y. Desmedt
Download Full-text
Some new attacks upon security protocols
Proceedings 9th IEEE Computer Security Foundations Workshop CSFW-96
◽
10.1109/csfw.1996.503701
◽
2002
◽
Cited By ~ 89
Author(s):
G. Lowe
Keyword(s):
Security Protocols
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close