default search action
13th CSFW 2000: Cambridge, England, UK
- Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000. IEEE Computer Society 2000, ISBN 0-7695-0671-2
Names and Certificates
- Ninghui Li:
Local Names in SPKI/SDSI. 2-15 - Jonathan K. Millen, Rebecca N. Wright:
Reasoning about Trust and Insurance in a Public Key Infrastructure. 16-22
Strands and Multiset Rewriting
- Joshua D. Guttman, F. Javier Thayer:
Protocol Independence through Disjoint Encryption. 24-34 - Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov:
Relating Strands and Multiset Rewriting for Security Protocol Analysis. 35-51 - Grit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe:
Optimizing Protocol Rewrite Rules of CIL Specifications. 52-62
Automated Security Protocol Methods
- Adrian Perrig, Dawn Song:
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. 64-76 - Anthony H. Dekker:
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis. 77-87 - Luigia Carlucci Aiello, Fabio Massacci:
An Executable Specification Language for Planning Attacks to Security Protocols. 88-102
Panel
- Teresa F. Lunt:
Foundations for Intrusion Detection?. 104-106
Network Security
- Tuomas Aura, Matt Bishop, Dean Sniegowski:
Analyzing Single-Server Network Inhibition. 108-117 - Pankaj Kakkar, Carl A. Gunter, Martín Abadi:
Reasoning about Secrecy for Active Networks. 118-129
Invariants, Induction, Ranks, Languages, and Ideals
- James Heather, Steve A. Schneider:
Towards Automatic Verification of Authentication Protocols on an Unbounded Network. 132-143 - Ernie Cohen:
TAPS: A First-Order Verifier for Cryptographic Protocols. 144-158 - Catherine Meadows:
Invariant Generation Techniques in Cryptographic Protocol Analysis. 159-167
Noninterference and Information Flow
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli:
Information Flow Analysis in a Discrete-Time Process Algebra. 170-184 - Heiko Mantel:
Possibilistic Definitions of Security - An Assembly Kit. 185-199 - Andrei Sabelfeld, David Sands:
Probabilistic Noninterference for Multi-Threaded Programs. 200-214
Invited Talk
- Anthony E. Sale:
Lorenz and Colossus. 216-222
Java and Mobile Code Security
- Günter Karjoth:
An Operational Semantics of Java 2 Access Control. 224-232 - Mads Dam, Pablo Giambiagi:
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. 233-244
Types and Language-Based Security
- Dennis M. Volpano:
Secure Introduction of One-Way Functions. 246-254 - James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. 255-268 - Peter Sewell, Jan Vitek:
Secure Composition of Untrusted Code: Wrappers and Causality Types. 269-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.