


default search action
16th CSFW 2003: Pacific Grove, California, USA
- 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA. IEEE Computer Society 2003, ISBN 0-7695-1927-X

Information Flow
- Geoffrey Smith:

Probabilistic Noninterference through Weak Probabilistic Bisimulation. 3-13 - Annalisa Bossi, Damiano Macedonio, Carla Piazza

, Sabina Rossi:
Secure Contexts for Confidential Data. 14-28 - Steve Zdancewic, Andrew C. Myers:

Observational Determinism for Concurrent Program Security. 29-
Protocols I
- Jonathan K. Millen, Vitaly Shmatikov:

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. 47-61 - Catherine Meadows:

A Procedure for Verifying Security Against Type Confusion Attacks. 62-
Logics for Anonymity and Distributed System Security
- Joseph Y. Halpern, Kevin R. O'Neill:

Anonymity and Information Hiding in Multiagent Systems. 75-88 - Ninghui Li, John C. Mitchell:

Understanding SPKI/SDSI Using First-Order Logic. 89-
Protocols II
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic

:
A Derivation System for Security Protocols and its Logical Formalization. 109-125 - Chiara Bodei

, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson
, Hanne Riis Nielson
:
Automatic Validation of Protocol Narration. 126-140 - Philippa J. Broadfoot, Gavin Lowe:

On Distributed Security Transactions that Use Secure Transport Protocols. 141-
Access Control & Information Flow
- Anindya Banerjee, David A. Naumann

:
Using Access Control for Secure Information Flow in a Java-like Language. 155-169 - Tom Chothia, Dominic Duggan, Jan Vitek:

Type-Based Distributed Access Control. 170-
Authorization and Security Policies
- Joseph Y. Halpern, Vicky Weissman:

Using First-Order Logic to Reason about Policies. 187-201 - Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine:

On Generalized Authorization Problems. 202-
Computational Analysis of Security Protocols
- Liqun Chen

, Caroline Kudla:
Identity Based Authenticated Key Agreement Protocols from Pairings. 219-233 - Jonathan C. Herzog:

The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model. 234-247 - Bogdan Warinschi:

A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. 248-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














