default search action
Search dblp for Publications
export results for "toc:db/conf/ifip1-7/wits2010.bht:"
@proceedings{DBLP:conf/ifip1-7/2010wits, editor = {Alessandro Armando and Gavin Lowe}, title = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16074-5}, doi = {10.1007/978-3-642-16074-5}, isbn = {978-3-642-16073-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BugliesiCM10, author = {Michele Bugliesi and Stefano Calzavara and Damiano Macedonio}, editor = {Alessandro Armando and Gavin Lowe}, title = {Secrecy and Authenticity Types for Secure Distributed Messaging}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {23--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_3}, doi = {10.1007/978-3-642-16074-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/BugliesiCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BugliesiM10, author = {Michele Bugliesi and Paolo Modesti}, editor = {Alessandro Armando and Gavin Lowe}, title = {AnBx - Security Protocols Design and Verification}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {164--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_12}, doi = {10.1007/978-3-642-16074-5\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BugliesiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CentenaroF10, author = {Matteo Centenaro and Riccardo Focardi}, editor = {Alessandro Armando and Gavin Lowe}, title = {Match It or Die: Proving Integrity by Equality}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {130--145}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_10}, doi = {10.1007/978-3-642-16074-5\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CentenaroF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CostaDM10, author = {Gabriele Costa and Pierpaolo Degano and Fabio Martinelli}, editor = {Alessandro Armando and Gavin Lowe}, title = {Modular Plans for Secure Service Composition}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {41--58}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_4}, doi = {10.1007/978-3-642-16074-5\_4}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CostaDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Alessandro Armando and Gavin Lowe}, title = {Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_9}, doi = {10.1007/978-3-642-16074-5\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FalconeF10, author = {Andrea Falcone and Riccardo Focardi}, editor = {Alessandro Armando and Gavin Lowe}, title = {Formal Analysis of Key Integrity in PKCS{\#}11}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {77--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_6}, doi = {10.1007/978-3-642-16074-5\_6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/FalconeF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FocardiL10, author = {Riccardo Focardi and Flaminia L. Luccio}, editor = {Alessandro Armando and Gavin Lowe}, title = {Secure Upgrade of Hardware Security Modules in Bank Networks}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {95--110}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_7}, doi = {10.1007/978-3-642-16074-5\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/FocardiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10, author = {Aaron D. Jaggard and Catherine Meadows and Michael W. Mislove and Roberto Segala}, editor = {Alessandro Armando and Gavin Lowe}, title = {Reasoning about Probabilistic Security Using Task-PIOAs}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {2--22}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_2}, doi = {10.1007/978-3-642-16074-5\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/NielsonGN10, author = {Flemming Nielson and Han Gao and Hanne Riis Nielson}, editor = {Alessandro Armando and Gavin Lowe}, title = {The CaPiTo Approach to Protocol Validation - (Invited Talk)}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {1}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_1}, doi = {10.1007/978-3-642-16074-5\_1}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/NielsonGN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/PalamidessiAA10, author = {Catuscia Palamidessi and M{\'{a}}rio S. Alvim and Miguel E. Andr{\'{e}}s}, editor = {Alessandro Armando and Gavin Lowe}, title = {Interactive Information Flow - (Invited Talk)}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {111}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_8}, doi = {10.1007/978-3-642-16074-5\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/PalamidessiAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/PiresC10, author = {M{\'{a}}rio Pires and Lu{\'{\i}}s Caires}, editor = {Alessandro Armando and Gavin Lowe}, title = {A Type System for Access Control Views in Object-Oriented Languages}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {59--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_5}, doi = {10.1007/978-3-642-16074-5\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/PiresC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, editor = {Alessandro Armando and Gavin Lowe}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {146--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.