Search dblp for Publications

export results for "toc:db/conf/fosad/fosad2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/fosad/Abadi09,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Logic in Access Control (Tutorial Notes)},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {145--165},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_5},
  doi          = {10.1007/978-3-642-03829-7\_5},
  timestamp    = {Thu, 14 Oct 2021 10:12:35 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/Abadi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/AlbertAGPZ09,
  author       = {Elvira Albert and
                  Puri Arenas and
                  Samir Genaim and
                  Germ{\'{a}}n Puebla and
                  Damiano Zanardini},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Resource Usage Analysis and Its Application to Resource Certification},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {258--288},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_9},
  doi          = {10.1007/978-3-642-03829-7\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fosad/AlbertAGPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BessonCJP09,
  author       = {Fr{\'{e}}d{\'{e}}ric Besson and
                  David Cachera and
                  Thomas P. Jensen and
                  David Pichardie},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Certified Static Analysis by Abstract Interpretation},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {223--257},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_8},
  doi          = {10.1007/978-3-642-03829-7\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BessonCJP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/LeinoMS09,
  author       = {K. Rustan M. Leino and
                  Peter M{\"{u}}ller and
                  Jan Smans},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Verification of Concurrent Programs with Chalice},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {195--222},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_7},
  doi          = {10.1007/978-3-642-03829-7\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/LeinoMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/LopezRA09,
  author       = {Javier L{\'{o}}pez and
                  Rodrigo Roman and
                  Cristina Alcaraz},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Analysis of Security Threats, Requirements, Technologies and Standards
                  in Wireless Sensor Networks},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {289--338},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_10},
  doi          = {10.1007/978-3-642-03829-7\_10},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fosad/LopezRA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/ModersheimV09,
  author       = {Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {The Open-Source Fixed-Point Model Checker for Symbolic Analysis of
                  Security Protocols},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {166--194},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_6},
  doi          = {10.1007/978-3-642-03829-7\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fosad/ModersheimV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fosad/2009,
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7},
  doi          = {10.1007/978-3-642-03829-7},
  isbn         = {978-3-642-03828-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BartheK08,
  author       = {Gilles Barthe and
                  C{\'{e}}sar Kunz},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {An Introduction to Certificate Translation},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {51--95},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_2},
  doi          = {10.1007/978-3-642-03829-7\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BartheK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/Chadwick08,
  author       = {David W. Chadwick},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Federated Identity Management},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {96--120},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_3},
  doi          = {10.1007/978-3-642-03829-7\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fosad/Chadwick08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/JacobsP08,
  author       = {Bart Jacobs and
                  Wolter Pieters},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Electronic Voting in the Netherlands: From Early Adoption to Early
                  Abolishment},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {121--144},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_4},
  doi          = {10.1007/978-3-642-03829-7\_4},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fosad/JacobsP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/EscobarMM07,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {1--50},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_1},
  doi          = {10.1007/978-3-642-03829-7\_1},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/EscobarMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics