Search dblp for Publications

export results for "toc:db/conf/csfw/csfw1996.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/Boyd96,
  author       = {Colin Boyd},
  title        = {A Class of Flexible and Efficient Key Management Protocols},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {2--8},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503685},
  doi          = {10.1109/CSFW.1996.503685},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Boyd96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Brackin96,
  author       = {Stephen H. Brackin},
  title        = {A {HOL} extension of {GNY} for automatically analyzing cryptographic
                  protocols},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {62},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503691},
  doi          = {10.1109/CSFW.1996.503691},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Brackin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuppensS96,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel},
  title        = {Specifying a security policy: a case study},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {123},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503697},
  doi          = {10.1109/CSFW.1996.503697},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CuppensS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Desmedt96,
  author       = {Yvo Desmedt},
  title        = {Simmons' protocol is not free of subliminal channels},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {170--175},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503702},
  doi          = {10.1109/CSFW.1996.503702},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Desmedt96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Dhaeseleer96,
  author       = {Patrik D'haeseleer},
  title        = {An Immunological Approach to Change Detection: Theoretical Results},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {18},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503687},
  doi          = {10.1109/CSFW.1996.503687},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Dhaeseleer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Focardi96,
  author       = {Riccardo Focardi},
  title        = {Comparing Two Information Flow Security Properties},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {116--122},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503696},
  doi          = {10.1109/CSFW.1996.503696},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Focardi96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GiuriI96,
  author       = {Luigi Giuri and
                  Pietro Iglio},
  title        = {A Formal Model for Role-Based Access Control with Constraints},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {136--145},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503698},
  doi          = {10.1109/CSFW.1996.503698},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GiuriI96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe96,
  author       = {Gavin Lowe},
  title        = {Some new attacks upon security protocols},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {162--169},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503701},
  doi          = {10.1109/CSFW.1996.503701},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MalkiR96,
  author       = {Dalia Malki and
                  Michael K. Reiter},
  title        = {A High-Throughput Secure Reliable Multicast Protocol},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {9--17},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503686},
  doi          = {10.1109/CSFW.1996.503686},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MalkiR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/McDermottG96,
  author       = {John P. McDermott and
                  David M. Goldschlag},
  title        = {Towards a model of storage jamming},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {176},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503703},
  doi          = {10.1109/CSFW.1996.503703},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/McDermottG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows96,
  author       = {Catherine Meadows},
  title        = {Language generation and verification in the {NRL} protocol analyzer},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {48--61},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503690},
  doi          = {10.1109/CSFW.1996.503690},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MillenK96,
  author       = {Jonathan K. Millen and
                  Hai{-}Ping Ko},
  title        = {Narrowing terminates for encryption},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {39},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503689},
  doi          = {10.1109/CSFW.1996.503689},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MillenK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PeriWK96,
  author       = {Ramesh V. Peri and
                  William A. Wulf and
                  Darrell M. Kienzle},
  title        = {A Logic of Composition for Information Flow Predicates},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {82--94},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503693},
  doi          = {10.1109/CSFW.1996.503693},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PeriWK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Roscoe96,
  author       = {A. W. Roscoe},
  title        = {Intensional specifications of security protocols},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {28--38},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503688},
  doi          = {10.1109/CSFW.1996.503688},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Roscoe96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Ryan96,
  author       = {Peter Ryan},
  title        = {A Genealogy of Non-Interference},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {158},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503700},
  doi          = {10.1109/CSFW.1996.503700},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Ryan96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Sinclair96,
  author       = {Jane E. Sinclair},
  title        = {Action Systems for Security Specification},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {102},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503695},
  doi          = {10.1109/CSFW.1996.503695},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Sinclair96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Spalka96,
  author       = {Adrian Spalka},
  title        = {The non-primitiveness of the simple-security property and its non-applicability
                  to relational databases},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {146},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503699},
  doi          = {10.1109/CSFW.1996.503699},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Spalka96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Syverson96,
  author       = {Paul F. Syverson},
  title        = {What is an Attack on a Cryptographic Protocal?},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {188},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503704},
  doi          = {10.1109/CSFW.1996.503704},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Syverson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Zaba96,
  author       = {Stefek Zaba},
  title        = {E-Commerce Payment Protocols: Requirements and Analysis},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {78},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503692},
  doi          = {10.1109/CSFW.1996.503692},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Zaba96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ZakinthinosL96,
  author       = {Aris Zakinthinos and
                  E. Stewart Lee},
  title        = {How and why feedback composition fails [secure systems]},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {95--101},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503694},
  doi          = {10.1109/CSFW.1996.503694},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ZakinthinosL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1996,
  title        = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/3781/proceeding},
  isbn         = {0-8186-7522-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics