default search action
Search dblp for Publications
export results for "stream:conf/wits2:"
@proceedings{DBLP:conf/ifip1-7/2010wits, editor = {Alessandro Armando and Gavin Lowe}, title = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16074-5}, doi = {10.1007/978-3-642-16074-5}, isbn = {978-3-642-16073-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BugliesiCM10, author = {Michele Bugliesi and Stefano Calzavara and Damiano Macedonio}, editor = {Alessandro Armando and Gavin Lowe}, title = {Secrecy and Authenticity Types for Secure Distributed Messaging}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {23--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_3}, doi = {10.1007/978-3-642-16074-5\_3}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BugliesiCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BugliesiM10, author = {Michele Bugliesi and Paolo Modesti}, editor = {Alessandro Armando and Gavin Lowe}, title = {AnBx - Security Protocols Design and Verification}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {164--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_12}, doi = {10.1007/978-3-642-16074-5\_12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BugliesiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CentenaroF10, author = {Matteo Centenaro and Riccardo Focardi}, editor = {Alessandro Armando and Gavin Lowe}, title = {Match It or Die: Proving Integrity by Equality}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {130--145}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_10}, doi = {10.1007/978-3-642-16074-5\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CentenaroF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CostaDM10, author = {Gabriele Costa and Pierpaolo Degano and Fabio Martinelli}, editor = {Alessandro Armando and Gavin Lowe}, title = {Modular Plans for Secure Service Composition}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {41--58}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_4}, doi = {10.1007/978-3-642-16074-5\_4}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CostaDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Alessandro Armando and Gavin Lowe}, title = {Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_9}, doi = {10.1007/978-3-642-16074-5\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FalconeF10, author = {Andrea Falcone and Riccardo Focardi}, editor = {Alessandro Armando and Gavin Lowe}, title = {Formal Analysis of Key Integrity in PKCS{\#}11}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {77--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_6}, doi = {10.1007/978-3-642-16074-5\_6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/FalconeF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FocardiL10, author = {Riccardo Focardi and Flaminia L. Luccio}, editor = {Alessandro Armando and Gavin Lowe}, title = {Secure Upgrade of Hardware Security Modules in Bank Networks}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {95--110}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_7}, doi = {10.1007/978-3-642-16074-5\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/FocardiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10, author = {Aaron D. Jaggard and Catherine Meadows and Michael W. Mislove and Roberto Segala}, editor = {Alessandro Armando and Gavin Lowe}, title = {Reasoning about Probabilistic Security Using Task-PIOAs}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {2--22}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_2}, doi = {10.1007/978-3-642-16074-5\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/NielsonGN10, author = {Flemming Nielson and Han Gao and Hanne Riis Nielson}, editor = {Alessandro Armando and Gavin Lowe}, title = {The CaPiTo Approach to Protocol Validation - (Invited Talk)}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {1}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_1}, doi = {10.1007/978-3-642-16074-5\_1}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/NielsonGN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/PalamidessiAA10, author = {Catuscia Palamidessi and M{\'{a}}rio S. Alvim and Miguel E. Andr{\'{e}}s}, editor = {Alessandro Armando and Gavin Lowe}, title = {Interactive Information Flow - (Invited Talk)}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {111}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_8}, doi = {10.1007/978-3-642-16074-5\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/PalamidessiAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/PiresC10, author = {M{\'{a}}rio Pires and Lu{\'{\i}}s Caires}, editor = {Alessandro Armando and Gavin Lowe}, title = {A Type System for Access Control Views in Object-Oriented Languages}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {59--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_5}, doi = {10.1007/978-3-642-16074-5\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/PiresC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, editor = {Alessandro Armando and Gavin Lowe}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {146--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/AdetoyeB09, author = {Adedayo Adetoye and Atta Badii}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {A Policy Model for Secure Information Flow}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {1--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_1}, doi = {10.1007/978-3-642-03459-6\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/AdetoyeB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/AldiniB09, author = {Alessandro Aldini and Marco Bernardo}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {18--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_2}, doi = {10.1007/978-3-642-03459-6\_2}, timestamp = {Wed, 25 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/AldiniB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ArsacBCC09, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Validating Security Protocols under the General Attacker}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {34--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_3}, doi = {10.1007/978-3-642-03459-6\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ArsacBCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Bartoletti09, author = {Massimo Bartoletti}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Usage Automata}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {52--69}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_4}, doi = {10.1007/978-3-642-03459-6\_4}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Bartoletti09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BodeiBB09, author = {Chiara Bodei and Linda Brodo and Roberto Bruni}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Static Detection of Logic Flaws in Service-Oriented Applications}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {70--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_5}, doi = {10.1007/978-3-642-03459-6\_5}, timestamp = {Thu, 26 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BodeiBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BrobergS09, author = {Niklas Broberg and David Sands}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Improving the Semantics of Imperfect Security}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {88--91}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_6}, doi = {10.1007/978-3-642-03459-6\_6}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BrobergS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FroschleS09, author = {Sibylle B. Fr{\"{o}}schle and Graham Steel}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Analysing PKCS{\#}11 Key Management APIs with Unbounded Fresh Data}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {92--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_7}, doi = {10.1007/978-3-642-03459-6\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/FroschleS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Guttman09, author = {Joshua D. Guttman}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Transformations between Cryptographic Protocols}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {107--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_8}, doi = {10.1007/978-3-642-03459-6\_8}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Guttman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Hernandez-ArdietaFR09, author = {Jorge L. Hernandez{-}Ardieta and Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and Benjam{\'{\i}}n Ramos}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Formal Validation of {OFEPSP+} with {AVISPA}}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {124--137}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_9}, doi = {10.1007/978-3-642-03459-6\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Hernandez-ArdietaFR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/HutterM09, author = {Dieter Hutter and Ra{\'{u}}l Monroy}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {On the Automated Correction of Protocols with Improper Message Encoding}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {138--154}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_10}, doi = {10.1007/978-3-642-03459-6\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/HutterM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JurjensW09, author = {Jan J{\"{u}}rjens and Tjark Weber}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Finite Models in FOL-Based Crypto-Protocol Verification}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {155--172}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_11}, doi = {10.1007/978-3-642-03459-6\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JurjensW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KeighrenAS09, author = {Gavin Keighren and David Aspinall and Graham Steel}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Towards a Type System for Security APIs}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {173--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_12}, doi = {10.1007/978-3-642-03459-6\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KeighrenAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MazareW09, author = {Laurent Mazar{\'{e}} and Bogdan Warinschi}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {193--210}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_13}, doi = {10.1007/978-3-642-03459-6\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/MazareW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Ryan09, author = {Peter Y. A. Ryan}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {How Many Election Officials Does It Take to Change an Election?}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {211--221}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_14}, doi = {10.1007/978-3-642-03459-6\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Ryan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2009wits, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6}, doi = {10.1007/978-3-642-03459-6}, isbn = {978-3-642-03458-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2009wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/BarthM05, author = {Adam Barth and John C. Mitchell}, editor = {Catherine Meadows}, title = {Enterprise privacy promises and enforcement}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {58--66}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045412}, doi = {10.1145/1045405.1045412}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/popl/BarthM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/BartolettiDF05, author = {Massimo Bartoletti and Pierpaolo Degano and Gian{-}Luigi Ferrari}, editor = {Catherine Meadows}, title = {Policy framings for access control}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {5--11}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045407}, doi = {10.1145/1045405.1045407}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/BartolettiDF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CervesatoJSW05, author = {Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Christopher Walstad}, editor = {Catherine Meadows}, title = {Specifying Kerberos 5 cross-realm authentication}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {12--26}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045408}, doi = {10.1145/1045405.1045408}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/CervesatoJSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/EchahedP05, author = {Rachid Echahed and Fr{\'{e}}d{\'{e}}ric Prost}, editor = {Catherine Meadows}, title = {Handling declared information leakage: extended abstract}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {1--4}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045406}, doi = {10.1145/1045405.1045406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/EchahedP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/FocardiMP05, author = {Riccardo Focardi and Matteo Maffei and Francesco Placella}, editor = {Catherine Meadows}, title = {Inferring authentication tags}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {41--49}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045410}, doi = {10.1145/1045405.1045410}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/FocardiMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/GoodloeGS05, author = {Alwyn Goodloe and Carl A. Gunter and Mark{-}Oliver Stehr}, editor = {Catherine Meadows}, title = {Formal prototyping in early stages of protocol design}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {67--80}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045413}, doi = {10.1145/1045405.1045413}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/GoodloeGS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/HansenSN05, author = {Steffen M. Hansen and Jakob Skriver and Hanne Riis Nielson}, editor = {Catherine Meadows}, title = {Using static analysis to validate the {SAML} single sign-on protocol}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {27--40}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045409}, doi = {10.1145/1045405.1045409}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/HansenSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/JacobsPW05, author = {Bart Jacobs and Wolter Pieters and Martijn Warnier}, editor = {Catherine Meadows}, title = {Statically checking confidentiality via dynamic labels}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {50--56}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045411}, doi = {10.1145/1045405.1045411}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/JacobsPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/Ryan05, author = {Peter Y. A. Ryan}, editor = {Catherine Meadows}, title = {A variant of the Chaum voter-verifiable scheme}, booktitle = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, pages = {81--88}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1045405.1045414}, doi = {10.1145/1045405.1045414}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/Ryan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/popl/2005wits, editor = {Catherine Meadows}, title = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-58113-980-2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/2005wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.