Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/secret:"
@proceedings{DBLP:conf/secret/2008, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, publisher = {Elsevier}, year = {2009}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/234/suppl/C}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secret/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AlTurkiMG09, author = {Musab AlTurki and Jos{\'{e}} Meseguer and Carl A. Gunter}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Probabilistic Modeling and Analysis of DoS Protection for the {ASV} Protocol}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {3--18}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.069}, doi = {10.1016/J.ENTCS.2009.02.069}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/AlTurkiMG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BarkerBF09, author = {Steve Barker and Clara Bertolissi and Maribel Fern{\'{a}}ndez}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Action Control by Term Rewriting}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {19--36}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.070}, doi = {10.1016/J.ENTCS.2009.02.070}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BarkerBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CirsteaMO09, author = {Horatiu Cirstea and Pierre{-}Etienne Moreau and Anderson Santana de Oliveira}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Rewrite Based Specification of Access Control Policies}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {37--54}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.071}, doi = {10.1016/J.ENTCS.2009.02.071}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CirsteaMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DoughertyE09, author = {Daniel J. Dougherty and Santiago Escobar}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Preface}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {1--2}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.068}, doi = {10.1016/J.ENTCS.2009.02.068}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DoughertyE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KirchnerKO09, author = {Claude Kirchner and H{\'{e}}l{\`{e}}ne Kirchner and Anderson Santana de Oliveira}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Analysis of Rewrite-Based Access Control Policies}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {55--75}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.072}, doi = {10.1016/J.ENTCS.2009.02.072}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/KirchnerKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Millen09, author = {Jonathan K. Millen}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Rewriting Techniques in the Constraint Solver}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {77--91}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.073}, doi = {10.1016/J.ENTCS.2009.02.073}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Millen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MitchellRS09, author = {John C. Mitchell and Arnab Roy and Mukund Sundararajan}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {An Automated Approach for Proving {PCL} Invariants}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {93--113}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.074}, doi = {10.1016/J.ENTCS.2009.02.074}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MitchellRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2006secret, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, publisher = {Elsevier}, year = {2007}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/171/issue/4}, timestamp = {Fri, 27 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/2006secret.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ChothiaDW07, author = {Tom Chothia and Dominic Duggan and Ye Wu}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract)}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {3--21}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.03.010}, doi = {10.1016/J.ENTCS.2007.03.010}, timestamp = {Fri, 27 Jan 2023 11:16:49 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ChothiaDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/EscobarMM07, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {23--36}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.053}, doi = {10.1016/J.ENTCS.2007.02.053}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/EscobarMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/FernandezK07, author = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Preface}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {1--2}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.052}, doi = {10.1016/J.ENTCS.2007.02.052}, timestamp = {Fri, 27 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/FernandezK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Lafourcade07, author = {Pascal Lafourcade}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {37--57}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.054}, doi = {10.1016/J.ENTCS.2007.02.054}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/Lafourcade07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Oliveira07, author = {Anderson Santana de Oliveira}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Rewriting-Based Access Control Policies}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {59--72}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.055}, doi = {10.1016/J.ENTCS.2007.02.055}, timestamp = {Fri, 27 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Oliveira07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/YoshidaV07, author = {Nobuko Yoshida and Vasco Thudichum Vasconcelos}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {73--93}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.056}, doi = {10.1016/J.ENTCS.2007.02.056}, timestamp = {Fri, 27 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/YoshidaV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.