default search action
16th CSFW 2003: Pacific Grove, California, USA
- 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA. IEEE Computer Society 2003, ISBN 0-7695-1927-X
Information Flow
- Geoffrey Smith:
Probabilistic Noninterference through Weak Probabilistic Bisimulation. 3-13 - Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi:
Secure Contexts for Confidential Data. 14-28 - Steve Zdancewic, Andrew C. Myers:
Observational Determinism for Concurrent Program Security. 29-
Protocols I
- Jonathan K. Millen, Vitaly Shmatikov:
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. 47-61 - Catherine Meadows:
A Procedure for Verifying Security Against Type Confusion Attacks. 62-
Logics for Anonymity and Distributed System Security
- Joseph Y. Halpern, Kevin R. O'Neill:
Anonymity and Information Hiding in Multiagent Systems. 75-88 - Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI Using First-Order Logic. 89-
Protocols II
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
A Derivation System for Security Protocols and its Logical Formalization. 109-125 - Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Automatic Validation of Protocol Narration. 126-140 - Philippa J. Broadfoot, Gavin Lowe:
On Distributed Security Transactions that Use Secure Transport Protocols. 141-
Access Control & Information Flow
- Anindya Banerjee, David A. Naumann:
Using Access Control for Secure Information Flow in a Java-like Language. 155-169 - Tom Chothia, Dominic Duggan, Jan Vitek:
Type-Based Distributed Access Control. 170-
Authorization and Security Policies
- Joseph Y. Halpern, Vicky Weissman:
Using First-Order Logic to Reason about Policies. 187-201 - Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine:
On Generalized Authorization Problems. 202-
Computational Analysis of Security Protocols
- Liqun Chen, Caroline Kudla:
Identity Based Authenticated Key Agreement Protocols from Pairings. 219-233 - Jonathan C. Herzog:
The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model. 234-247 - Bogdan Warinschi:
A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. 248-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.