default search action
FAST 2005: Newcastle upon Tyne, UK
- Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3866, Springer 2006, ISBN 3-540-32628-6 - Brian Randell, Peter Y. A. Ryan:
Voting Technologies and Trust. 1-4 - Susan Pancho-Festin, Dieter Gollmann:
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. 5-15 - Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. 16-33 - Rob Delicata, Steve A. Schneider:
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. 34-46 - Boris Köpf, Heiko Mantel:
Eliminating Implicit Information Leaks by Transformational Typing and Unification. 47-62 - Nicoletta De Francesco, Luca Martini:
Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations. 63-80 - Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan:
Opacity Generalised to Transition Systems. 81-95 - Constantin Enea:
Unifying Decidability Results on Protection Systems Using Simulations. 96-111 - Gilles Barthe, Tamara Rezk, Ando Saabas:
Proof Obligations Preserving Compilation. 112-126 - Hongbin Zhou, Simon N. Foley:
A Logic for Analysing Subterfuge in Delegation Chains. 127-141 - Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Probable Innocence Revisited. 142-157 - Johan W. Klüwer, Arild Waaler:
Relative Trustworthiness. 158-170 - Simon Winwood, Manuel M. T. Chakravarty:
Secure Untrusted Binaries - Provably!. 171-186 - Olga Pacheco:
Normative Specification: A Tool for Trust and Security. 187-202 - Tom Chothia, Dominic Duggan:
Type-Based Distributed Access Control vs. Untyped Attackers. 203-216 - Romain Laborde, François Barrère, Abdelmalek Benzekri:
A Security Management Information Model Derivation Framework: From Goals to Configurations. 217-234 - Aybek Mukhamedov, Mark Dermot Ryan:
On Anonymity with Identity Escrow. 235-243 - Kun Wei, James Heather:
Towards Verification of Timed Non-repudiation Protocols. 244-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.