default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2007
- Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4 [contents] - 2006
- Danièle Beauquier, Ruggero Lanotte:
Hiding Information in Multi Level Security Systems. Formal Aspects in Security and Trust 2006: 250-269 - Santiago Zanella Béguelin, Gustavo Betarte, Carlos Luna:
A Formal Specification of the MIDP 2.0 Security Model. Formal Aspects in Security and Trust 2006: 220-234 - Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti:
Strategic Games on Defense Trees. Formal Aspects in Security and Trust 2006: 1-15 - Johannes Borgström, Olga Grinchtein, Simon Kramer:
Timed Calculus of Cryptographic Communication. Formal Aspects in Security and Trust 2006: 16-30 - Gyrd Brændeland, Ketil Stølen:
A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. Formal Aspects in Security and Trust 2006: 31-46 - Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. Formal Aspects in Security and Trust 2006: 47-64 - Yuxin Deng, Jun Pang, Peng Wu:
Measuring Anonymity with Relative Entropy. Formal Aspects in Security and Trust 2006: 65-79 - Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin:
Formalizing and Analyzing Sender Invariance. Formal Aspects in Security and Trust 2006: 80-95 - Karl Krukow, Mogens Nielsen:
From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust. Formal Aspects in Security and Trust 2006: 96-111 - Ilaria Matteucci:
A Tool for the Synthesis of Controller Programs. Formal Aspects in Security and Trust 2006: 112-126 - Ron van der Meyden, Chenyi Zhang:
A Comparison of Semantic Models for Noninterference. Formal Aspects in Security and Trust 2006: 235-249 - Christian W. Probst, René Rydhof Hansen, Flemming Nielson:
Where Can an Insider Attack? Formal Aspects in Security and Trust 2006: 127-142 - Fredrik Seehusen, Ketil Stølen:
Maintaining Information Flow Security Under Refinement and Transformation. Formal Aspects in Security and Trust 2006: 143-157 - Ludwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi:
A Classification of Delegation Schemes for Attribute Authority. Formal Aspects in Security and Trust 2006: 158-169 - Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen:
Program Partitioning Using Dynamic Trust Models. Formal Aspects in Security and Trust 2006: 170-184 - Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. Formal Aspects in Security and Trust 2006: 270-284 - Terkel K. Tolstrup, Flemming Nielson, René Rydhof Hansen:
Locality-Based Security Policies. Formal Aspects in Security and Trust 2006: 185-201 - Kun Wei, James Heather:
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. Formal Aspects in Security and Trust 2006: 202-219
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-26 09:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint