default search action
10th CSFW 1997: Rockport, Massachusetts, USA
- 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA. IEEE Computer Society 1997, ISBN 0-8186-7990-5
Protocol Checking in CSP
- Steve A. Schneider:
Verifying authentication protocols with CSP. 3-17 - Gavin Lowe:
Casper: A Compiler for the Analysis of Security Protocols. 18-30 - Gavin Lowe:
A Hierarchy of Authentication Specification. 31-44
Protocol Engineering
- James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui:
Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications. 45-58 - Tuomas Aura:
Strategies against Replay Attacks. 59-69
Protocol Verification in Higher Order Logic
- Lawrence C. Paulson:
Proving Properties of Security Protocols by Induction. 70-83 - Lawrence C. Paulson:
Mechanized proofs for a recursive authentication protocol. 84-95
Languages for Formal Specification of Security Protocols
- Catherine Meadows:
Languages for Formal Specification of Security Protocols. 96-97
Distributed System Security
- Martín Abadi:
On SDSI's Linked Local Name Spaces. 98-108 - Paul F. Syverson:
A Different Look at Secure Distributed Computation. 109-115 - Dahlia Malkhi, Michael K. Reiter:
Unreliable Intrusion Detection in Distributed Computations. 116-125
Protocol Applications
- Jianying Zhou, Dieter Gollmann:
An Efficient Non-repudiation Protocol . 126-132 - Dominique Bolignano:
Towards the Formal Verification of Electronic Commerce Protocols. 133-147
Information Flow: Chair
- Kan Zhang:
A Theory for System Security. 148-155 - Dennis M. Volpano, Geoffrey Smith:
Eliminating Covert Flows with Minimum Typings. 156-169
The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead
- J. Sinclair:
The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead. 170-172
Security Policies
- Yun Bai, Vijay Varadharajan:
A Logic For State Transformations in Authorization Policies. 173-182 - Richard T. Simon, Mary Ellen Zurko:
Separation of Duty in Role-based Environments. 183-194 - Ciarán Bryce:
Security Engineering of Lattice-Based Policies. 195-208
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.