Search dblp for Publications

export results for "stream:streams/conf/tosca:"

 download as .bib file

@proceedings{DBLP:conf/tosca/2011,
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27375-9},
  doi          = {10.1007/978-3-642-27375-9},
  isbn         = {978-3-642-27374-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/BackesHM11,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Union and Intersection Types for Secure Protocol Implementations},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {1--28},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_1},
  doi          = {10.1007/978-3-642-27375-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/BackesHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/BackesMPR11,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Kim Pecina and
                  Raphael M. Reischuk},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {{G2C:} Cryptographic Protocols from Goal-Driven Specifications},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {57--77},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_4},
  doi          = {10.1007/978-3-642-27375-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/BackesMPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/Cortier11,
  author       = {V{\'{e}}ronique Cortier},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Secure Composition of Protocols},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {29--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_2},
  doi          = {10.1007/978-3-642-27375-9\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/Cortier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/DahlDS11,
  author       = {Morten Dahl and
                  St{\'{e}}phanie Delaune and
                  Graham Steel},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Formal Analysis of Privacy for Anonymous Location Based Services},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_6},
  doi          = {10.1007/978-3-642-27375-9\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/DahlDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/Guttman11,
  author       = {Joshua D. Guttman},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Security Goals and Protocol Transformations},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_8},
  doi          = {10.1007/978-3-642-27375-9\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/Guttman11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/HuismanB11,
  author       = {Marieke Huisman and
                  Henri{-}Charles Blondeel},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Model-Checking Secure Information Flow for Multi-threaded Programs},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_9},
  doi          = {10.1007/978-3-642-27375-9\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/HuismanB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/JacquemardLTV11,
  author       = {Florent Jacquemard and
                  {\'{E}}tienne Lozes and
                  Ralf Treinen and
                  Jules Villard},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Multiple Congruence Relations, First-Order Theories on Terms, and
                  the Frames of the Applied Pi-Calculus},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {166--185},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_10},
  doi          = {10.1007/978-3-642-27375-9\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/JacquemardLTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/LuoRS11,
  author       = {Zhengqin Luo and
                  Tamara Rezk and
                  Manuel Serrano},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Automated Code Injection Prevention for Web Applications},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {186--204},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_11},
  doi          = {10.1007/978-3-642-27375-9\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/LuoRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/MBarkaKL11,
  author       = {Moez Ben MBarka and
                  Francine Krief and
                  Olivier Ly},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Modeling Long-Term Signature Validation for Resolution of Dispute},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_5},
  doi          = {10.1007/978-3-642-27375-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/MBarkaKL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/Malladi11,
  author       = {Sreekanth Malladi},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Soundness of Removing Cancellation Identities in Protocol Analysis
                  under Exclusive-OR},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {205--224},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_12},
  doi          = {10.1007/978-3-642-27375-9\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/Malladi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/Maurer11,
  author       = {Ueli Maurer},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Constructive Cryptography - {A} New Paradigm for Security Definitions
                  and Proofs},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {33--56},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_3},
  doi          = {10.1007/978-3-642-27375-9\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/Maurer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tosca/RuiterP11,
  author       = {Joeri de Ruiter and
                  Erik Poll},
  editor       = {Sebastian M{\"{o}}dersheim and
                  Catuscia Palamidessi},
  title        = {Formal Analysis of the {EMV} Protocol Suite},
  booktitle    = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011,
                  Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6993},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27375-9\_7},
  doi          = {10.1007/978-3-642-27375-9\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tosca/RuiterP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics