


default search action
13th CSFW 2000: Cambridge, England, UK
- Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000. IEEE Computer Society 2000, ISBN 0-7695-0671-2

Names and Certificates
- Ninghui Li:

Local Names in SPKI/SDSI. 2-15 - Jonathan K. Millen, Rebecca N. Wright:

Reasoning about Trust and Insurance in a Public Key Infrastructure. 16-22
Strands and Multiset Rewriting
- Joshua D. Guttman, F. Javier Thayer:

Protocol Independence through Disjoint Encryption. 24-34 - Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov:

Relating Strands and Multiset Rewriting for Security Protocol Analysis. 35-51 - Grit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe:

Optimizing Protocol Rewrite Rules of CIL Specifications. 52-62
Automated Security Protocol Methods
- Adrian Perrig, Dawn Song:

Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. 64-76 - Anthony H. Dekker:

C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis. 77-87 - Luigia Carlucci Aiello, Fabio Massacci

:
An Executable Specification Language for Planning Attacks to Security Protocols. 88-102
Panel
- Teresa F. Lunt:

Foundations for Intrusion Detection?. 104-106
Network Security
- Tuomas Aura, Matt Bishop

, Dean Sniegowski:
Analyzing Single-Server Network Inhibition. 108-117 - Pankaj Kakkar, Carl A. Gunter, Martín Abadi:

Reasoning about Secrecy for Active Networks. 118-129
Invariants, Induction, Ranks, Languages, and Ideals
- James Heather, Steve A. Schneider:

Towards Automatic Verification of Authentication Protocols on an Unbounded Network. 132-143 - Ernie Cohen:

TAPS: A First-Order Verifier for Cryptographic Protocols. 144-158 - Catherine Meadows:

Invariant Generation Techniques in Cryptographic Protocol Analysis. 159-167
Noninterference and Information Flow
- Riccardo Focardi

, Roberto Gorrieri, Fabio Martinelli:
Information Flow Analysis in a Discrete-Time Process Algebra. 170-184 - Heiko Mantel:

Possibilistic Definitions of Security - An Assembly Kit. 185-199 - Andrei Sabelfeld, David Sands:

Probabilistic Noninterference for Multi-Threaded Programs. 200-214
Invited Talk
- Anthony E. Sale:

Lorenz and Colossus. 216-222
Java and Mobile Code Security
- Günter Karjoth:

An Operational Semantics of Java 2 Access Control. 224-232 - Mads Dam, Pablo Giambiagi:

Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. 233-244
Types and Language-Based Security
- Dennis M. Volpano:

Secure Introduction of One-Way Functions. 246-254 - James Heather, Gavin Lowe, Steve A. Schneider

:
How to Prevent Type Flaw Attacks on Security Protocols. 255-268 - Peter Sewell

, Jan Vitek:
Secure Composition of Untrusted Code: Wrappers and Causality Types. 269-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














