Search dblp for Publications

export results for "toc:db/conf/csfw/csfw2000.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/AielloM00,
  author       = {Luigia Carlucci Aiello and
                  Fabio Massacci},
  title        = {An Executable Specification Language for Planning Attacks to Security
                  Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {88--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856928},
  doi          = {10.1109/CSFW.2000.856928},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AielloM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AuraBS00,
  author       = {Tuomas Aura and
                  Matt Bishop and
                  Dean Sniegowski},
  title        = {Analyzing Single-Server Network Inhibition},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {108--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856930},
  doi          = {10.1109/CSFW.2000.856930},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AuraBS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CervesatoDMLS00,
  author       = {Iliano Cervesato and
                  Nancy A. Durgin and
                  John C. Mitchell and
                  Patrick Lincoln and
                  Andre Scedrov},
  title        = {Relating Strands and Multiset Rewriting for Security Protocol Analysis},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {35--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856924},
  doi          = {10.1109/CSFW.2000.856924},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CervesatoDMLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Cohen00,
  author       = {Ernie Cohen},
  title        = {{TAPS:} {A} First-Order Verifier for Cryptographic Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {144--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856933},
  doi          = {10.1109/CSFW.2000.856933},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Cohen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DamG00,
  author       = {Mads Dam and
                  Pablo Giambiagi},
  title        = {Confidentiality for Mobile Code: The Case of a Simple Payment Protocol},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {233--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856940},
  doi          = {10.1109/CSFW.2000.856940},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DamG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Dekker00,
  author       = {Anthony H. Dekker},
  title        = {{C3PO:} {A} Tool for Automatic Sound Cryptographic Protocol Analysis},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {77--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856927},
  doi          = {10.1109/CSFW.2000.856927},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Dekker00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DenkerMGF00,
  author       = {Grit Denker and
                  Jonathan K. Millen and
                  Antonio Grau and
                  Juliana K{\"{u}}ster Filipe},
  title        = {Optimizing Protocol Rewrite Rules of {CIL} Specifications},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {52--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856925},
  doi          = {10.1109/CSFW.2000.856925},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DenkerMGF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FocardiGM00,
  author       = {Riccardo Focardi and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Information Flow Analysis in a Discrete-Time Process Algebra},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {170--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856935},
  doi          = {10.1109/CSFW.2000.856935},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FocardiGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GuttmanT00,
  author       = {Joshua D. Guttman and
                  F. Javier Thayer},
  title        = {Protocol Independence through Disjoint Encryption},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {24--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856923},
  doi          = {10.1109/CSFW.2000.856923},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GuttmanT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HeatherLS00,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {255--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856942},
  doi          = {10.1109/CSFW.2000.856942},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HeatherLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HeatherS00,
  author       = {James Heather and
                  Steve A. Schneider},
  title        = {Towards Automatic Verification of Authentication Protocols on an Unbounded
                  Network},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {132--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856932},
  doi          = {10.1109/CSFW.2000.856932},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HeatherS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KakkarGA00,
  author       = {Pankaj Kakkar and
                  Carl A. Gunter and
                  Mart{\'{\i}}n Abadi},
  title        = {Reasoning about Secrecy for Active Networks},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {118--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856931},
  doi          = {10.1109/CSFW.2000.856931},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KakkarGA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Karjoth00,
  author       = {G{\"{u}}nter Karjoth},
  title        = {An Operational Semantics of Java 2 Access Control},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {224--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856939},
  doi          = {10.1109/CSFW.2000.856939},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Karjoth00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Li00,
  author       = {Ninghui Li},
  title        = {Local Names in {SPKI/SDSI}},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {2--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856921},
  doi          = {10.1109/CSFW.2000.856921},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Li00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lunt00,
  author       = {Teresa F. Lunt},
  title        = {Foundations for Intrusion Detection?},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {104--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856929},
  doi          = {10.1109/CSFW.2000.856929},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lunt00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Mantel00,
  author       = {Heiko Mantel},
  title        = {Possibilistic Definitions of Security - An Assembly Kit},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {185--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856936},
  doi          = {10.1109/CSFW.2000.856936},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Mantel00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows00,
  author       = {Catherine Meadows},
  title        = {Invariant Generation Techniques in Cryptographic Protocol Analysis},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {159--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856934},
  doi          = {10.1109/CSFW.2000.856934},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MillenW00,
  author       = {Jonathan K. Millen and
                  Rebecca N. Wright},
  title        = {Reasoning about Trust and Insurance in a Public Key Infrastructure},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {16--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856922},
  doi          = {10.1109/CSFW.2000.856922},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MillenW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PerrigS00,
  author       = {Adrian Perrig and
                  Dawn Song},
  title        = {Looking for Diamonds in the Desert - Extending Automatic Protocol
                  Generation to Three-Party Authentication and Key Agreement Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {64--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856926},
  doi          = {10.1109/CSFW.2000.856926},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PerrigS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SabelfeldS00,
  author       = {Andrei Sabelfeld and
                  David Sands},
  title        = {Probabilistic Noninterference for Multi-Threaded Programs},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {200--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856937},
  doi          = {10.1109/CSFW.2000.856937},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SabelfeldS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Sale00,
  author       = {Anthony E. Sale},
  title        = {Lorenz and Colossus},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {216--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856938},
  doi          = {10.1109/CSFW.2000.856938},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Sale00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SewellV00,
  author       = {Peter Sewell and
                  Jan Vitek},
  title        = {Secure Composition of Untrusted Code: Wrappers and Causality Types},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {269--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856943},
  doi          = {10.1109/CSFW.2000.856943},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SewellV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Volpano00,
  author       = {Dennis M. Volpano},
  title        = {Secure Introduction of One-Way Functions},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {246--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856941},
  doi          = {10.1109/CSFW.2000.856941},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Volpano00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2000,
  title        = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6924/proceeding},
  isbn         = {0-7695-0671-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}