


default search action
10th CSFW 1997: Rockport, Massachusetts, USA
- 10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA. IEEE Computer Society 1997, ISBN 0-8186-7990-5

Protocol Checking in CSP
- Steve A. Schneider

:
Verifying authentication protocols with CSP. 3-17 - Gavin Lowe:

Casper: A Compiler for the Analysis of Security Protocols. 18-30 - Gavin Lowe:

A Hierarchy of Authentication Specification. 31-44
Protocol Engineering
- James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui:

Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications. 45-58 - Tuomas Aura:

Strategies against Replay Attacks. 59-69
Protocol Verification in Higher Order Logic
- Lawrence C. Paulson:

Proving Properties of Security Protocols by Induction. 70-83 - Lawrence C. Paulson:

Mechanized proofs for a recursive authentication protocol. 84-95
Languages for Formal Specification of Security Protocols
- Catherine Meadows:

Languages for Formal Specification of Security Protocols. 96-97
Distributed System Security
- Martín Abadi:

On SDSI's Linked Local Name Spaces. 98-108 - Paul F. Syverson:

A Different Look at Secure Distributed Computation. 109-115 - Dahlia Malkhi, Michael K. Reiter:

Unreliable Intrusion Detection in Distributed Computations. 116-125
Protocol Applications
- Jianying Zhou, Dieter Gollmann:

An Efficient Non-repudiation Protocol . 126-132 - Dominique Bolignano:

Towards the Formal Verification of Electronic Commerce Protocols. 133-147
Information Flow: Chair
- Kan Zhang:

A Theory for System Security. 148-155 - Dennis M. Volpano, Geoffrey Smith:

Eliminating Covert Flows with Minimum Typings. 156-169
The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead
- J. Sinclair:

The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead. 170-172
Security Policies
- Yun Bai, Vijay Varadharajan:

A Logic For State Transformations in Authorization Policies. 173-182 - Richard T. Simon, Mary Ellen Zurko:

Separation of Duty in Role-based Environments. 183-194 - Ciarán Bryce:

Security Engineering of Lattice-Based Policies. 195-208

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














