Search dblp for Publications

export results for "stream:conf/wits2:"

 download as .bib file

@proceedings{DBLP:conf/ifip1-7/2010wits,
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16074-5},
  doi          = {10.1007/978-3-642-16074-5},
  isbn         = {978-3-642-16073-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BugliesiCM10,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Damiano Macedonio},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Secrecy and Authenticity Types for Secure Distributed Messaging},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_3},
  doi          = {10.1007/978-3-642-16074-5\_3},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BugliesiCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BugliesiM10,
  author       = {Michele Bugliesi and
                  Paolo Modesti},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {AnBx - Security Protocols Design and Verification},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {164--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_12},
  doi          = {10.1007/978-3-642-16074-5\_12},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BugliesiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CentenaroF10,
  author       = {Matteo Centenaro and
                  Riccardo Focardi},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Match It or Die: Proving Integrity by Equality},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_10},
  doi          = {10.1007/978-3-642-16074-5\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CentenaroF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CostaDM10,
  author       = {Gabriele Costa and
                  Pierpaolo Degano and
                  Fabio Martinelli},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Modular Plans for Secure Service Composition},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {41--58},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_4},
  doi          = {10.1007/978-3-642-16074-5\_4},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CostaDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Portunes: Representing Attack Scenarios Spanning through the Physical,
                  Digital and Social Domain},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_9},
  doi          = {10.1007/978-3-642-16074-5\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FalconeF10,
  author       = {Andrea Falcone and
                  Riccardo Focardi},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Formal Analysis of Key Integrity in PKCS{\#}11},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_6},
  doi          = {10.1007/978-3-642-16074-5\_6},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FalconeF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FocardiL10,
  author       = {Riccardo Focardi and
                  Flaminia L. Luccio},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Secure Upgrade of Hardware Security Modules in Bank Networks},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_7},
  doi          = {10.1007/978-3-642-16074-5\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FocardiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10,
  author       = {Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael W. Mislove and
                  Roberto Segala},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Reasoning about Probabilistic Security Using Task-PIOAs},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {2--22},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_2},
  doi          = {10.1007/978-3-642-16074-5\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/NielsonGN10,
  author       = {Flemming Nielson and
                  Han Gao and
                  Hanne Riis Nielson},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {The CaPiTo Approach to Protocol Validation - (Invited Talk)},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {1},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_1},
  doi          = {10.1007/978-3-642-16074-5\_1},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/NielsonGN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/PalamidessiAA10,
  author       = {Catuscia Palamidessi and
                  M{\'{a}}rio S. Alvim and
                  Miguel E. Andr{\'{e}}s},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Interactive Information Flow - (Invited Talk)},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {111},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_8},
  doi          = {10.1007/978-3-642-16074-5\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/PalamidessiAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/PiresC10,
  author       = {M{\'{a}}rio Pires and
                  Lu{\'{\i}}s Caires},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {A Type System for Access Control Views in Object-Oriented Languages},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_5},
  doi          = {10.1007/978-3-642-16074-5\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/PiresC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Steve Kremer and
                  Mounira Kourjieh},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Towards Automatic Analysis of Election Verifiability Properties},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_11},
  doi          = {10.1007/978-3-642-16074-5\_11},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/AdetoyeB09,
  author       = {Adedayo Adetoye and
                  Atta Badii},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {A Policy Model for Secure Information Flow},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_1},
  doi          = {10.1007/978-3-642-03459-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/AdetoyeB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/AldiniB09,
  author       = {Alessandro Aldini and
                  Marco Bernardo},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {A General Framework for Nondeterministic, Probabilistic, and Stochastic
                  Noninterference},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {18--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_2},
  doi          = {10.1007/978-3-642-03459-6\_2},
  timestamp    = {Wed, 25 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/AldiniB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ArsacBCC09,
  author       = {Wihem Arsac and
                  Giampaolo Bella and
                  Xavier Chantry and
                  Luca Compagna},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Validating Security Protocols under the General Attacker},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_3},
  doi          = {10.1007/978-3-642-03459-6\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ArsacBCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Bartoletti09,
  author       = {Massimo Bartoletti},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Usage Automata},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_4},
  doi          = {10.1007/978-3-642-03459-6\_4},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Bartoletti09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BodeiBB09,
  author       = {Chiara Bodei and
                  Linda Brodo and
                  Roberto Bruni},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Static Detection of Logic Flaws in Service-Oriented Applications},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_5},
  doi          = {10.1007/978-3-642-03459-6\_5},
  timestamp    = {Thu, 26 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BodeiBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BrobergS09,
  author       = {Niklas Broberg and
                  David Sands},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Improving the Semantics of Imperfect Security},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {88--91},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_6},
  doi          = {10.1007/978-3-642-03459-6\_6},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BrobergS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FroschleS09,
  author       = {Sibylle B. Fr{\"{o}}schle and
                  Graham Steel},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Analysing PKCS{\#}11 Key Management APIs with Unbounded Fresh Data},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_7},
  doi          = {10.1007/978-3-642-03459-6\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FroschleS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Guttman09,
  author       = {Joshua D. Guttman},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Transformations between Cryptographic Protocols},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_8},
  doi          = {10.1007/978-3-642-03459-6\_8},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Guttman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Hernandez-ArdietaFR09,
  author       = {Jorge L. Hernandez{-}Ardieta and
                  Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and
                  Benjam{\'{\i}}n Ramos},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Formal Validation of {OFEPSP+} with {AVISPA}},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_9},
  doi          = {10.1007/978-3-642-03459-6\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Hernandez-ArdietaFR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/HutterM09,
  author       = {Dieter Hutter and
                  Ra{\'{u}}l Monroy},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {On the Automated Correction of Protocols with Improper Message Encoding},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_10},
  doi          = {10.1007/978-3-642-03459-6\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/HutterM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JurjensW09,
  author       = {Jan J{\"{u}}rjens and
                  Tjark Weber},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Finite Models in FOL-Based Crypto-Protocol Verification},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_11},
  doi          = {10.1007/978-3-642-03459-6\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JurjensW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KeighrenAS09,
  author       = {Gavin Keighren and
                  David Aspinall and
                  Graham Steel},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Towards a Type System for Security APIs},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {173--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_12},
  doi          = {10.1007/978-3-642-03459-6\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KeighrenAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MazareW09,
  author       = {Laurent Mazar{\'{e}} and
                  Bogdan Warinschi},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Separating Trace Mapping and Reactive Simulatability Soundness: The
                  Case of Adaptive Corruption},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_13},
  doi          = {10.1007/978-3-642-03459-6\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MazareW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Ryan09,
  author       = {Peter Y. A. Ryan},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {How Many Election Officials Does It Take to Change an Election?},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {211--221},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_14},
  doi          = {10.1007/978-3-642-03459-6\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Ryan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2009wits,
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6},
  doi          = {10.1007/978-3-642-03459-6},
  isbn         = {978-3-642-03458-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2009wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/BarthM05,
  author       = {Adam Barth and
                  John C. Mitchell},
  editor       = {Catherine Meadows},
  title        = {Enterprise privacy promises and enforcement},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {58--66},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045412},
  doi          = {10.1145/1045405.1045412},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/BarthM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/BartolettiDF05,
  author       = {Massimo Bartoletti and
                  Pierpaolo Degano and
                  Gian{-}Luigi Ferrari},
  editor       = {Catherine Meadows},
  title        = {Policy framings for access control},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {5--11},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045407},
  doi          = {10.1145/1045405.1045407},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/BartolettiDF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CervesatoJSW05,
  author       = {Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Christopher Walstad},
  editor       = {Catherine Meadows},
  title        = {Specifying Kerberos 5 cross-realm authentication},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {12--26},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045408},
  doi          = {10.1145/1045405.1045408},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/CervesatoJSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/EchahedP05,
  author       = {Rachid Echahed and
                  Fr{\'{e}}d{\'{e}}ric Prost},
  editor       = {Catherine Meadows},
  title        = {Handling declared information leakage: extended abstract},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045406},
  doi          = {10.1145/1045405.1045406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/EchahedP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/FocardiMP05,
  author       = {Riccardo Focardi and
                  Matteo Maffei and
                  Francesco Placella},
  editor       = {Catherine Meadows},
  title        = {Inferring authentication tags},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {41--49},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045410},
  doi          = {10.1145/1045405.1045410},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/FocardiMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/GoodloeGS05,
  author       = {Alwyn Goodloe and
                  Carl A. Gunter and
                  Mark{-}Oliver Stehr},
  editor       = {Catherine Meadows},
  title        = {Formal prototyping in early stages of protocol design},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {67--80},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045413},
  doi          = {10.1145/1045405.1045413},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/GoodloeGS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/HansenSN05,
  author       = {Steffen M. Hansen and
                  Jakob Skriver and
                  Hanne Riis Nielson},
  editor       = {Catherine Meadows},
  title        = {Using static analysis to validate the {SAML} single sign-on protocol},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {27--40},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045409},
  doi          = {10.1145/1045405.1045409},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/HansenSN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/JacobsPW05,
  author       = {Bart Jacobs and
                  Wolter Pieters and
                  Martijn Warnier},
  editor       = {Catherine Meadows},
  title        = {Statically checking confidentiality via dynamic labels},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {50--56},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045411},
  doi          = {10.1145/1045405.1045411},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/JacobsPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/Ryan05,
  author       = {Peter Y. A. Ryan},
  editor       = {Catherine Meadows},
  title        = {A variant of the Chaum voter-verifiable scheme},
  booktitle    = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1045405.1045414},
  doi          = {10.1145/1045405.1045414},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/Ryan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/popl/2005wits,
  editor       = {Catherine Meadows},
  title        = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-58113-980-2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/2005wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}