researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2002
2003
Filter by Tag
OR
AND
NOT
1
C++
Java
analysis
context-aware
contracts
logic
modeling
protocol
security
state machines
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Andrew D. Gordon
Anthony Hall
Antonio Durante
Bart Preneel
Carsten Rudolph
Colin Boyd
David Sinclair
David von Oheimb
Dieter Gollmann
E. Menif
Ernie Cohen
Felix C. Gärtner
Fred B. Schneider
Frédéric Oehl
Frédéric Painchaud
Gavin Lowe
Gethin J. Norman
Gordon Thomas Rohrmair
Gérard Cécé
Joseph Y. Halpern
Filter by Top terms
[+]
OR
AND
NOT
1
16-18
2002
adversaries
analysing
analysis
approach
approximation
area
aspects
authenticity
automatic
cryptographic
formal
properties
protocol
protocols
secure
security
specification
systems
FASec (fasec)
Editions
Publications
Viewing Publication 1 - 19 from 19
2003
Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers
Ali E. Abdallah
,
Peter Ryan
,
Steve Schneider
, editors,
Volume 2629 of
Lecture Notes in Computer Science
, Springer,
2003.
2002
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis
Colin Boyd
,
Kapali Viswanathan
.
fasec 2003
:
49-61
[doi]
TAPS: The Last Few Slides
Ernie Cohen
.
fasec 2003
:
183-190
[doi]
Secure Self-certified Code for Java
Mourad Debbabi
,
Jules Desharnais
,
M. Fourati
,
E. Menif
,
Frédéric Painchaud
,
Nadia Tawbi
.
fasec 2003
:
133-151
[doi]
Formal Specification for Fast Automatic IDS Training
Antonio Durante
,
Roberto Di Pietro
,
Luigi V. Mancini
.
fasec 2003
:
191-204
[doi]
Analysing Security Protocols
Dieter Gollmann
.
fasec 2003
:
71-80
[doi]
Authenticity Types for Cryptographic Protocols
Andrew D. Gordon
.
fasec 2003
:
3
[doi]
Revisiting Liveness Properties in the Context of Secure Systems
Felix C. Gärtner
.
fasec 2003
:
221-238
[doi]
Security Analysis of (Un-) Fair Non-repudiation Protocols
Sigrid Gürgens
,
Carsten Rudolph
.
fasec 2003
:
97-114
[doi]
Z Styles for Security Properties and Modern User Interfaces
Anthony Hall
.
fasec 2003
:
152-166
[doi]
Modeling Adversaries in a Logic for Security Protocol Analysis
Joseph Y. Halpern
,
Riccardo Pucella
.
fasec 2003
:
115-132
[doi]
Analysis of Probabilistic Contract Signing
Gethin J. Norman
,
Vitaly Shmatikov
.
fasec 2003
:
81-96
[doi]
Automatic Approximation for the Verification of Cryptographic Protocols
Frédéric Oehl
,
Gérard Cécé
,
Olga Kouchnarenko
,
David Sinclair
.
fasec 2003
:
33-48
[doi]
Verifying the SET Protocol: Overview
Lawrence C. Paulson
.
fasec 2003
:
4-14
[doi]
Cryptographic Challenges: The Past and the Future
Bart Preneel
.
fasec 2003
:
167-182
[doi]
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area
Gordon Thomas Rohrmair
,
Gavin Lowe
.
fasec 2003
:
205-220
[doi]
Lifting Reference Monitors from the Kernel
Fred B. Schneider
.
fasec 2003
:
1-2
[doi]
Critical Critical Systems
Susan Stepney
.
fasec 2003
:
62-70
[doi]
Interacting State Machines: A Stateful Approach to Proving Security
David von Oheimb
.
fasec 2003
:
15-32
[doi]
Sign in
or
sign up
to see more results.