Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/tosca:"
@proceedings{DBLP:conf/tosca/2011, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27375-9}, doi = {10.1007/978-3-642-27375-9}, isbn = {978-3-642-27374-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/BackesHM11, author = {Michael Backes and Catalin Hritcu and Matteo Maffei}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Union and Intersection Types for Secure Protocol Implementations}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {1--28}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_1}, doi = {10.1007/978-3-642-27375-9\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/tosca/BackesHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/BackesMPR11, author = {Michael Backes and Matteo Maffei and Kim Pecina and Raphael M. Reischuk}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {{G2C:} Cryptographic Protocols from Goal-Driven Specifications}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {57--77}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_4}, doi = {10.1007/978-3-642-27375-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/BackesMPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/Cortier11, author = {V{\'{e}}ronique Cortier}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Secure Composition of Protocols}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {29--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_2}, doi = {10.1007/978-3-642-27375-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/Cortier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/DahlDS11, author = {Morten Dahl and St{\'{e}}phanie Delaune and Graham Steel}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Formal Analysis of Privacy for Anonymous Location Based Services}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {98--112}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_6}, doi = {10.1007/978-3-642-27375-9\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/DahlDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/Guttman11, author = {Joshua D. Guttman}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Security Goals and Protocol Transformations}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {130--147}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_8}, doi = {10.1007/978-3-642-27375-9\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/Guttman11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/HuismanB11, author = {Marieke Huisman and Henri{-}Charles Blondeel}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Model-Checking Secure Information Flow for Multi-threaded Programs}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {148--165}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_9}, doi = {10.1007/978-3-642-27375-9\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/HuismanB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/JacquemardLTV11, author = {Florent Jacquemard and {\'{E}}tienne Lozes and Ralf Treinen and Jules Villard}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {166--185}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_10}, doi = {10.1007/978-3-642-27375-9\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/JacquemardLTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/LuoRS11, author = {Zhengqin Luo and Tamara Rezk and Manuel Serrano}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Automated Code Injection Prevention for Web Applications}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {186--204}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_11}, doi = {10.1007/978-3-642-27375-9\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/LuoRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/MBarkaKL11, author = {Moez Ben MBarka and Francine Krief and Olivier Ly}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Modeling Long-Term Signature Validation for Resolution of Dispute}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {78--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_5}, doi = {10.1007/978-3-642-27375-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/MBarkaKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/Malladi11, author = {Sreekanth Malladi}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {205--224}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_12}, doi = {10.1007/978-3-642-27375-9\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/Malladi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/Maurer11, author = {Ueli Maurer}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Constructive Cryptography - {A} New Paradigm for Security Definitions and Proofs}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {33--56}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_3}, doi = {10.1007/978-3-642-27375-9\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/Maurer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tosca/RuiterP11, author = {Joeri de Ruiter and Erik Poll}, editor = {Sebastian M{\"{o}}dersheim and Catuscia Palamidessi}, title = {Formal Analysis of the {EMV} Protocol Suite}, booktitle = {Theory of Security and Applications - Joint Workshop, {TOSCA} 2011, Saarbr{\"{u}}cken, Germany, March 31 - April 1, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6993}, pages = {113--129}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27375-9\_7}, doi = {10.1007/978-3-642-27375-9\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tosca/RuiterP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.