default search action
Search dblp for Publications
export results for "toc:db/conf/ifip1-7/fast2005.bht:"
@proceedings{DBLP:conf/ifip1-7/2005, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11679219}, doi = {10.1007/11679219}, isbn = {3-540-32628-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BartheRS05, author = {Gilles Barthe and Tamara Rezk and Ando Saabas}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Proof Obligations Preserving Compilation}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {112--126}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_9}, doi = {10.1007/11679219\_9}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BartheRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BryansKMR05, author = {Jeremy W. Bryans and Maciej Koutny and Laurent Mazar{\'{e}} and Peter Y. A. Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Opacity Generalised to Transition Systems}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {81--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_7}, doi = {10.1007/11679219\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BryansKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ChatzikokolakisP05, author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Probable Innocence Revisited}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {142--157}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_11}, doi = {10.1007/11679219\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ChatzikokolakisP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ChothiaD05, author = {Tom Chothia and Dominic Duggan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Type-Based Distributed Access Control vs. Untyped Attackers}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {203--216}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_15}, doi = {10.1007/11679219\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ChothiaD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DelicataS05, author = {Rob Delicata and Steve A. Schneider}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {34--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_4}, doi = {10.1007/11679219\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DelicataS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Enea05, author = {Constantin Enea}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Unifying Decidability Results on Protection Systems Using Simulations}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {96--111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_8}, doi = {10.1007/11679219\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Enea05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FrancescoM05, author = {Nicoletta De Francesco and Luca Martini}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {63--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_6}, doi = {10.1007/11679219\_6}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/FrancescoM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KluwerW05, author = {Johan W. Kl{\"{u}}wer and Arild Waaler}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Relative Trustworthiness}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {158--170}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_12}, doi = {10.1007/11679219\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KluwerW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KopfM05, author = {Boris K{\"{o}}pf and Heiko Mantel}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Eliminating Implicit Information Leaks by Transformational Typing and Unification}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {47--62}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_5}, doi = {10.1007/11679219\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KopfM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/LabordeBB05, author = {Romain Laborde and Fran{\c{c}}ois Barr{\`{e}}re and Abdelmalek Benzekri}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {A Security Management Information Model Derivation Framework: From Goals to Configurations}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {217--234}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_16}, doi = {10.1007/11679219\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/LabordeBB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MukhamedovR05, author = {Aybek Mukhamedov and Mark Dermot Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {On Anonymity with Identity Escrow}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {235--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_17}, doi = {10.1007/11679219\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/MukhamedovR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Pacheco05, author = {Olga Pacheco}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Normative Specification: {A} Tool for Trust and Security}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {187--202}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_14}, doi = {10.1007/11679219\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Pacheco05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Pancho-FestinG05, author = {Susan Pancho{-}Festin and Dieter Gollmann}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {5--15}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_2}, doi = {10.1007/11679219\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Pancho-FestinG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/RandellR05, author = {Brian Randell and Peter Y. A. Ryan}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Voting Technologies and Trust}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {1--4}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_1}, doi = {10.1007/11679219\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/RandellR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SongKTBCL05, author = {Tao Song and Calvin Ko and Chinyang Henry Tseng and Poornima Balasubramanyam and Anant Chaudhary and Karl N. Levitt}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {16--33}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_3}, doi = {10.1007/11679219\_3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SongKTBCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/WeiH05, author = {Kun Wei and James Heather}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Towards Verification of Timed Non-repudiation Protocols}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {244--257}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_18}, doi = {10.1007/11679219\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/WeiH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/WinwoodC05, author = {Simon Winwood and Manuel M. T. Chakravarty}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Secure Untrusted Binaries - Provably!}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {171--186}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_13}, doi = {10.1007/11679219\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/WinwoodC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ZhouF05, author = {Hongbin Zhou and Simon N. Foley}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {A Logic for Analysing Subterfuge in Delegation Chains}, booktitle = {Formal Aspects in Security and Trust, Third International Workshop, {FAST} 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3866}, pages = {127--141}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11679219\_10}, doi = {10.1007/11679219\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ZhouF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.