Search dblp for Publications

export results for "stream:streams/conf/secret:"

 download as .bib file

@proceedings{DBLP:conf/secret/2008,
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/234/suppl/C},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secret/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AlTurkiMG09,
  author       = {Musab AlTurki and
                  Jos{\'{e}} Meseguer and
                  Carl A. Gunter},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Probabilistic Modeling and Analysis of DoS Protection for the {ASV}
                  Protocol},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {3--18},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.069},
  doi          = {10.1016/J.ENTCS.2009.02.069},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/AlTurkiMG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BarkerBF09,
  author       = {Steve Barker and
                  Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Action Control by Term Rewriting},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {19--36},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.070},
  doi          = {10.1016/J.ENTCS.2009.02.070},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BarkerBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CirsteaMO09,
  author       = {Horatiu Cirstea and
                  Pierre{-}Etienne Moreau and
                  Anderson Santana de Oliveira},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Rewrite Based Specification of Access Control Policies},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {37--54},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.071},
  doi          = {10.1016/J.ENTCS.2009.02.071},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CirsteaMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DoughertyE09,
  author       = {Daniel J. Dougherty and
                  Santiago Escobar},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Preface},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.068},
  doi          = {10.1016/J.ENTCS.2009.02.068},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DoughertyE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KirchnerKO09,
  author       = {Claude Kirchner and
                  H{\'{e}}l{\`{e}}ne Kirchner and
                  Anderson Santana de Oliveira},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Analysis of Rewrite-Based Access Control Policies},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {55--75},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.072},
  doi          = {10.1016/J.ENTCS.2009.02.072},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KirchnerKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Millen09,
  author       = {Jonathan K. Millen},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Rewriting Techniques in the Constraint Solver},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {77--91},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.073},
  doi          = {10.1016/J.ENTCS.2009.02.073},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Millen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MitchellRS09,
  author       = {John C. Mitchell and
                  Arnab Roy and
                  Mukund Sundararajan},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {An Automated Approach for Proving {PCL} Invariants},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {93--113},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.074},
  doi          = {10.1016/J.ENTCS.2009.02.074},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MitchellRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2006secret,
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/171/issue/4},
  timestamp    = {Fri, 27 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/2006secret.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ChothiaDW07,
  author       = {Tom Chothia and
                  Dominic Duggan and
                  Ye Wu},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {An End-To-End Approach to Distributed Policy Language Implementation:
                  (Extended Abstract)},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {3--21},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.03.010},
  doi          = {10.1016/J.ENTCS.2007.03.010},
  timestamp    = {Fri, 27 Jan 2023 11:16:49 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ChothiaDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/EscobarMM07,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {23--36},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.053},
  doi          = {10.1016/J.ENTCS.2007.02.053},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/EscobarMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/FernandezK07,
  author       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Preface},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.052},
  doi          = {10.1016/J.ENTCS.2007.02.052},
  timestamp    = {Fri, 27 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/FernandezK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Lafourcade07,
  author       = {Pascal Lafourcade},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Intruder Deduction for the Equational Theory of Exclusive-or with
                  Commutative and Distributive Encryption},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {37--57},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.054},
  doi          = {10.1016/J.ENTCS.2007.02.054},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/Lafourcade07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Oliveira07,
  author       = {Anderson Santana de Oliveira},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Rewriting-Based Access Control Policies},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {59--72},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.055},
  doi          = {10.1016/J.ENTCS.2007.02.055},
  timestamp    = {Fri, 27 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Oliveira07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/YoshidaV07,
  author       = {Nobuko Yoshida and
                  Vasco Thudichum Vasconcelos},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Language Primitives and Type Discipline for Structured Communication-Based
                  Programming Revisited: Two Systems for Higher-Order Session Communication},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {73--93},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.056},
  doi          = {10.1016/J.ENTCS.2007.02.056},
  timestamp    = {Fri, 27 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/YoshidaV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics