ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
18th IEEE Computer Security Foundations Workshop (CSFW'05)
Latest Publications
TOTAL DOCUMENTS
27
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
0769523404
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Analysis of Typed Analyses of Authentication Protocols
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.8
◽
2005
◽
Cited By ~ 8
Author(s):
M. Bugliesi
◽
R. Focardi
◽
M. Maffei
Keyword(s):
Authentication Protocols
Download Full-text
Language-Based Information Erasure
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.19
◽
2005
◽
Cited By ~ 22
Author(s):
S. Chong
◽
A.C. Myers
Keyword(s):
Information Erasure
Download Full-text
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.7
◽
2005
◽
Cited By ~ 13
Author(s):
I. Cervesato
◽
C. Meadows
◽
D. Pavlovic
Keyword(s):
Key Distribution
Download Full-text
Practical Information-flow Control in Web-Based Information Systems
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.23
◽
2005
◽
Cited By ~ 5
Author(s):
Peng Li
◽
S. Zdancewic
Keyword(s):
Information Systems
◽
Flow Control
◽
Information Flow
◽
Information Flow Control
◽
Web Based
◽
Practical Information
Download Full-text
Enforcing Secure Service Composition
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.17
◽
2005
◽
Cited By ~ 23
Author(s):
M. Bartoletti
◽
P. Degano
◽
G.L. Ferrari
Keyword(s):
Service Composition
Download Full-text
Compositional Analysis of Contract Signing Protocols
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.12
◽
2005
◽
Cited By ~ 2
Author(s):
M. Backes
◽
A. Datta
◽
A. Derek
◽
J.C. Mitchell
◽
M. Turuani
Keyword(s):
Compositional Analysis
◽
Contract Signing
Download Full-text
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.13
◽
2005
◽
Cited By ~ 7
Author(s):
P. Adao
◽
G. Bana
◽
A. Scedrov
Keyword(s):
Information Theoretic
◽
Soundness And Completeness
Download Full-text
On Declassification and the Non-Disclosure Policy
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.21
◽
2005
◽
Cited By ~ 11
Author(s):
A.A. Matos
◽
G. Boudol
Keyword(s):
Disclosure Policy
Download Full-text
Achieving Information Flow Security through Precise Control of Effects
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.6
◽
2005
◽
Cited By ~ 7
Author(s):
W.L. Harrison
◽
J. Hook
Keyword(s):
Information Flow
◽
Precise Control
◽
Information Flow Security
Download Full-text
Game-Based Analysis of Denial-of-Service Prevention Protocols
18th IEEE Computer Security Foundations Workshop (CSFW'05)
◽
10.1109/csfw.2005.18
◽
2005
◽
Cited By ~ 21
Author(s):
A. Mahimkar
◽
V. Shmatikov
Keyword(s):
Denial Of Service
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close