


default search action
FOSAD 2011
- Alessandro Aldini

, Roberto Gorrieri:
Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures. Lecture Notes in Computer Science 6858, Springer 2011, ISBN 978-3-642-23081-3 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Giovanni Livraga
, Pierangela Samarati
:
Protecting Privacy in Data Release. 1-34 - Riccardo Focardi

, Flaminia L. Luccio
, Graham Steel:
An Introduction to Security API Analysis. 35-65 - Cédric Fournet, Karthikeyan Bhargavan, Andrew D. Gordon:

Cryptographic Verification by Typing for a Sample Protocol Implementation. 66-100 - David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania, Gonzalo Ortiz, Javier Valdazo:

Model-Driven Development of Security-Aware GUIs for Data-Centric Applications. 101-124 - Roberto Gorrieri

, Matteo Vernali:
On Intransitive Non-interference in Some Models of Concurrency. 125-151 - Yudistira Asnar, Fabio Massacci

:
A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach. 152-184 - Daniele Micciancio

:
The Geometry of Lattice Cryptography. 185-210 - Mário S. Alvim

, Miguel E. Andrés, Konstantinos Chatzikokolakis, Catuscia Palamidessi
:
Quantitative Information Flow and Applications to Differential Privacy. 211-230 - Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:

Risk Analysis of Changing and Evolving Systems Using CORAS. 231-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














