![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
FAST 2010: Pisa, Italy
- Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman:
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6561, Springer 2011, ISBN 978-3-642-19750-5 - Dusko Pavlovic
:
Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks. 1-17 - Max I. Kanovich, Tajana Ban Kirigin
, Vivek Nigam, Andre Scedrov
:
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems. 18-33 - Bruno Conchinha, David A. Basin, Carlos Caleiro
:
Efficient Decision Procedures for Message Deducibility and Static Equivalence. 34-49 - Allaa Kamil, Gavin Lowe:
Understanding Abstractions of Secure Channels. 50-64 - Mana Taghdiri, Gregor Snelting, Carsten Sinz:
Information Flow Analysis via Path Condition Refinement. 65-79 - Barbara Kordy, Sjouke Mauw
, Sasa Radomirovic
, Patrick Schweitzer:
Foundations of Attack-Defense Trees. 80-95 - Sibylle B. Fröschle, Nils Sommer:
Reasoning with Past to Prove PKCS#11 Keys Secure. 96-110 - Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan
, Graham Steel:
A Formal Analysis of Authentication in the TPM. 111-125 - Meilof Veeningen, Benne de Weger, Nicola Zannone
:
Modeling Identity-Related Properties and Their Privacy Strength. 126-140 - Tim Muller:
Semantics of Trust. 141-156 - Clément Hurlin, Hélène Kirchner:
Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction. 157-175 - Raphaël Khoury, Nadia Tawbi
:
Corrective Enforcement of Security Policies. 176-190 - Jason Crampton:
Cryptographic Enforcement of Role-Based Access Control. 191-205 - Francesco Ballardin, Massimo Merro
:
A Calculus for the Analysis of Wireless Network Security Protocols. 206-222 - Naipeng Dong
, Hugo L. Jonker, Jun Pang:
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus. 223-238
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.