18th CSFW 2005: Aix-en-Provence, France

Refine list

showing all ?? records

Introduction

Session 1: Information Flow and Security Goals

Session 2: Logic and Knowledge for Protocols

Session 3: Protocol Case Studies

Session 5: Protocol Verification Techniques

Session 6: Computational and Formal Models

Session 7: Access Control and Languages

Session 9: Declassification

Session 10: Availability and Denial of Service

a service of  Schloss Dagstuhl - Leibniz Center for Informatics