Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fosad/fosad2009.bht:"
@inproceedings{DBLP:conf/fosad/Abadi09, author = {Mart{\'{\i}}n Abadi}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Logic in Access Control (Tutorial Notes)}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {145--165}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_5}, doi = {10.1007/978-3-642-03829-7\_5}, timestamp = {Thu, 14 Oct 2021 10:12:35 +0200}, biburl = {https://dblp.org/rec/conf/fosad/Abadi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/AlbertAGPZ09, author = {Elvira Albert and Puri Arenas and Samir Genaim and Germ{\'{a}}n Puebla and Damiano Zanardini}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Resource Usage Analysis and Its Application to Resource Certification}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {258--288}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_9}, doi = {10.1007/978-3-642-03829-7\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fosad/AlbertAGPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BessonCJP09, author = {Fr{\'{e}}d{\'{e}}ric Besson and David Cachera and Thomas P. Jensen and David Pichardie}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Certified Static Analysis by Abstract Interpretation}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {223--257}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_8}, doi = {10.1007/978-3-642-03829-7\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BessonCJP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/LeinoMS09, author = {K. Rustan M. Leino and Peter M{\"{u}}ller and Jan Smans}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Verification of Concurrent Programs with Chalice}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {195--222}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_7}, doi = {10.1007/978-3-642-03829-7\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/LeinoMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/LopezRA09, author = {Javier L{\'{o}}pez and Rodrigo Roman and Cristina Alcaraz}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {289--338}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_10}, doi = {10.1007/978-3-642-03829-7\_10}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fosad/LopezRA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/ModersheimV09, author = {Sebastian M{\"{o}}dersheim and Luca Vigan{\`{o}}}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {166--194}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_6}, doi = {10.1007/978-3-642-03829-7\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fosad/ModersheimV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fosad/2009, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7}, doi = {10.1007/978-3-642-03829-7}, isbn = {978-3-642-03828-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BartheK08, author = {Gilles Barthe and C{\'{e}}sar Kunz}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {An Introduction to Certificate Translation}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {51--95}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03829-7\_2}, doi = {10.1007/978-3-642-03829-7\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BartheK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/Chadwick08, author = {David W. Chadwick}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Federated Identity Management}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {96--120}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03829-7\_3}, doi = {10.1007/978-3-642-03829-7\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fosad/Chadwick08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/JacobsP08, author = {Bart Jacobs and Wolter Pieters}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {121--144}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03829-7\_4}, doi = {10.1007/978-3-642-03829-7\_4}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fosad/JacobsP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/EscobarMM07, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {1--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-03829-7\_1}, doi = {10.1007/978-3-642-03829-7\_1}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/EscobarMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.