default search action
TOSCA 2011: Saarbrücken, Germany
- Sebastian Mödersheim, Catuscia Palamidessi:
Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6993, Springer 2012, ISBN 978-3-642-27374-2 - Michael Backes, Catalin Hritcu, Matteo Maffei:
Union and Intersection Types for Secure Protocol Implementations. 1-28 - Véronique Cortier:
Secure Composition of Protocols. 29-32 - Ueli Maurer:
Constructive Cryptography - A New Paradigm for Security Definitions and Proofs. 33-56 - Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk:
G2C: Cryptographic Protocols from Goal-Driven Specifications. 57-77 - Moez Ben MBarka, Francine Krief, Olivier Ly:
Modeling Long-Term Signature Validation for Resolution of Dispute. 78-97 - Morten Dahl, Stéphanie Delaune, Graham Steel:
Formal Analysis of Privacy for Anonymous Location Based Services. 98-112 - Joeri de Ruiter, Erik Poll:
Formal Analysis of the EMV Protocol Suite. 113-129 - Joshua D. Guttman:
Security Goals and Protocol Transformations. 130-147 - Marieke Huisman, Henri-Charles Blondeel:
Model-Checking Secure Information Flow for Multi-threaded Programs. 148-165 - Florent Jacquemard, Étienne Lozes, Ralf Treinen, Jules Villard:
Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus. 166-185 - Zhengqin Luo, Tamara Rezk, Manuel Serrano:
Automated Code Injection Prevention for Web Applications. 186-204 - Sreekanth Malladi:
Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR. 205-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.