18th IEEE Computer Security Foundations Workshop : proceedings : June 20-22, 2005, Aix-en-Provence, France (English)
- New search for: Computer Security Foundations Workshop
- New search for: IEEE Computer Society
- New search for: Computer Security Foundations Workshop
- New search for: IEEE Computer Society
2005
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:18th IEEE Computer Security Foundations Workshop : proceedings : June 20-22, 2005, Aix-en-Provence, France
-
Additional title:Computer Security Foundations, 2005, CSFW-18 2005, 18th IEEE Workshop
CSFW-18 2005
Computer Security Foundations Workshop -
Contributors:
-
Conference:Computer Security Foundations Workshop ; 18th
-
Publisher:
- New search for: IEEE Computer Society
-
Place of publication:Los Alamitos, Calif
-
Publication date:2005
-
Size:1 Online-Ressource (viii, 302 pages)
-
Remarks:illustrations
"IEEE Computer Society Order Number P2340"--Title page verso
Includes bibliographical references and index -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
Practical information flow control in Web-based information systemsPeng Li, / Zdancewic, S. et al. | 2005
- 16
-
Achieving information flow security through precise control of effectsHarrison, W.L. / Hook, J. et al. | 2005
- 31
-
Belief in information flowClarkson, M.R. / Myers, A.C. / Schneider, F.B. et al. | 2005
- 48
-
An encapsulated authentication logic for reasoning about key distribution protocolsCervesato, I. / Meadows, C. / Pavlovic, D. et al. | 2005
- 62
-
Deciding knowledge in security protocols under (many more) equational theoriesAbadi, M. / Cortier, V. et al. | 2005
- 78
-
A cryptographically sound Dolev-Yao style security proof of an electronic payment systemBackes, M. / Durmuth, M. et al. | 2005
- 94
-
Compositional analysis of contract signing protocolsBackes, M. / Datta, A. / Derek, A. / Mitchell, J.C. / Turuani, M. et al. | 2005
- 112
-
Analysis of typed analyses of authentication protocolsBugliesi, M. / Focardi, R. / Maffei, M. et al. | 2005
- 126
-
Temporal rank functions for forward secrecyDelicata, R. / Schneider, S. et al. | 2005
- 140
-
Reconstruction of attacks against cryptographic protocolsAllamigeon, X. / Blanchet, B. et al. | 2005
- 156
-
Polynomial runtime in simulatability definitionsHofheinz, D. / Muller-Quade, J. / Unruh, D. et al. | 2005
- 170
-
Computational and information-theoretic soundness and completeness of formal encryptionAdao, P. / Bana, G. / Scedrov, A. et al. | 2005
- 186
-
Nomad: a security model with non atomic actions and deadlinesCuppens, F. / Cuppens-Boulahia, N. / Sans, T. et al. | 2005
- 197
-
Type annotations to improve stack-based access controlTian Zhao, / Boyland, J. et al. | 2005
- 211
-
Enforcing secure service compositionBartoletti, M. / Degano, P. / Ferrari, G.L. et al. | 2005
- 226
-
On declassification and the non-disclosure policyMatos, A.A. / Boudol, G. et al. | 2005
- 241
-
Language-based information erasureChong, S. / Myers, A.C. et al. | 2005
- 255
-
Dimensions and principles of declassificationSabelfeld, A. / Sands, D. et al. | 2005
- 272
-
End-to-end availability policies and noninterferenceLantian Zheng, / Myers, A.C. et al. | 2005
- 287
-
Game-based analysis of denial-of-service prevention protocolsMahimkar, A. / Shmatikov, V. et al. | 2005
- 302
-
Author index| 2005
- i
-
18th IEEE Computer Security Foundations Workshop - Title Page| 2005
- iv
-
18th IEEE Computer Security Foundations Workshop - Copyright| 2005
- v
-
18th IEEE Computer Security Foundations Workshop - Table of Contents| 2005
- vii
-
Preface| 2005
- viii
-
Committees| 2005
-
Proceedings. 18th IEEE Computer Security| 2005