


default search action
1. FASec 2002: London, UK
- Ali E. Abdallah, Peter Y. A. Ryan, Steve A. Schneider:

Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers. Lecture Notes in Computer Science 2629, Springer 2003, ISBN 3-540-20693-0 - Fred B. Schneider:

Lifting Reference Monitors from the Kernel. 1-2 - Andy Gordon:

Authenticity Types for Cryptographic Protocols. 3 - Lawrence C. Paulson:

Verifying the SET Protocol: Overview. 4-14 - David von Oheimb:

Interacting State Machines: A Stateful Approach to Proving Security. 15-32 - Frédéric Oehl, Gérard Cécé, Olga Kouchnarenko

, David Sinclair:
Automatic Approximation for the Verification of Cryptographic Protocols. 33-48 - Colin Boyd, Kapali Viswanathan:

Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. 49-61 - Susan Stepney:

Critical Critical Systems. 62-70 - Dieter Gollmann:

Analysing Security Protocols. 71-80 - Gethin Norman, Vitaly Shmatikov:

Analysis of Probabilistic Contract Signing. 81-96 - Sigrid Gürgens, Carsten Rudolph

:
Security Analysis of (Un-) Fair Non-repudiation Protocols. 97-114 - Joseph Y. Halpern, Riccardo Pucella:

Modeling Adversaries in a Logic for Security Protocol Analysis. 115-132 - Mourad Debbabi

, Josée Desharnais
, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi
:
Secure Self-certified Code for Java. 133-151 - Anthony Hall:

Z Styles for Security Properties and Modern User Interfaces. 152-166 - Bart Preneel:

Cryptographic Challenges: The Past and the Future. 167-182 - Ernie Cohen:

TAPS: The Last Few Slides. 183-190 - Antonio Durante, Roberto Di Pietro, Luigi V. Mancini:

Formal Specification for Fast Automatic IDS Training. 191-204 - Gordon Thomas Rohrmair, Gavin Lowe:

Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. 205-220 - Felix C. Gärtner:

Revisiting Liveness Properties in the Context of Secure Systems. 221-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














