Search dblp for Publications

export results for "toc:db/conf/ccs/fmse2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/ArmandoCCCT08,
  author    = {Alessandro Armando and
               Roberto Carbone and
               Luca Compagna and
               Jorge Cu{\'{e}}llar and
               Llanos Tobarra},
  editor    = {Vitaly Shmatikov},
  title     = {Formal analysis of {SAML} 2.0 web browser single sign-on: breaking
               the SAML-based single sign-on for google apps},
  booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {1--10},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456396.1456397},
  doi       = {10.1145/1456396.1456397},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ArmandoCCCT08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrishnanNSW08,
  author    = {Ram Krishnan and
               Jianwei Niu and
               Ravi S. Sandhu and
               William H. Winsborough},
  editor    = {Vitaly Shmatikov},
  title     = {Stale-safe security properties for group-based secure information
               sharing},
  booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {53--62},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456396.1456402},
  doi       = {10.1145/1456396.1456402},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/KrishnanNSW08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McCarthyK08,
  author    = {Jay A. McCarthy and
               Shriram Krishnamurthi},
  editor    = {Vitaly Shmatikov},
  title     = {Minimal backups of cryptographic protocol runs},
  booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {11--20},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456396.1456398},
  doi       = {10.1145/1456396.1456398},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/McCarthyK08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McDermottF08,
  author    = {John P. McDermott and
               Leo Freitas},
  editor    = {Vitaly Shmatikov},
  title     = {A formal security policy for xenon},
  booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {43--52},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456396.1456401},
  doi       = {10.1145/1456396.1456401},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/McDermottF08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PoturalskiPH08a,
  author    = {Marcin Poturalski and
               Panagiotis Papadimitratos and
               Jean{-}Pierre Hubaux},
  editor    = {Vitaly Shmatikov},
  title     = {Towards provable secure neighbor discovery in wireless networks},
  booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {31--42},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456396.1456400},
  doi       = {10.1145/1456396.1456400},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/PoturalskiPH08a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouLL08,
  author    = {Ti Zhou and
               Mengjun Li and
               Zhoujun Li},
  editor    = {Vitaly Shmatikov},
  title     = {Local abstract verification and refinement of security protocols},
  booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {21--30},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456396.1456399},
  doi       = {10.1145/1456396.1456399},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ZhouLL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008fmse,
  editor    = {Vitaly Shmatikov},
  title     = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
               Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-288-7},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2008fmse.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics