


default search action
9th CSFW 1996: Dromquinna Manor, Kenmare, County Kerry, Ireland
- Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland. IEEE Computer Society 1996, ISBN 0-8186-7522-5

Protocols
- Colin Boyd:

A Class of Flexible and Efficient Key Management Protocols. 2-8 - Dalia Malki, Michael K. Reiter:

A High-Throughput Secure Reliable Multicast Protocol. 9-17 - Patrik D'haeseleer:

An Immunological Approach to Change Detection: Theoretical Results. 18-
Protocol Specification
- A. W. Roscoe:

Intensional specifications of security protocols. 28-38 - Jonathan K. Millen, Hai-Ping Ko:

Narrowing terminates for encryption. 39-
Protocol Analysis Tools
- Catherine Meadows:

Language generation and verification in the NRL protocol analyzer. 48-61 - Stephen H. Brackin:

A HOL extension of GNY for automatically analyzing cryptographic protocols. 62-
E-Commerce Challenge
- Stefek Zaba:

E-Commerce Payment Protocols: Requirements and Analysis. 78-
Composition
- Ramesh V. Peri, William A. Wulf, Darrell M. Kienzle:

A Logic of Composition for Information Flow Predicates. 82-94 - Aris Zakinthinos, E. Stewart Lee:

How and why feedback composition fails [secure systems]. 95-101 - Jane E. Sinclair:

Action Systems for Security Specification. 102-
Security Policies
- Riccardo Focardi

:
Comparing Two Information Flow Security Properties. 116-122 - Frédéric Cuppens, Claire Saurel:

Specifying a security policy: a case study. 123-
Access Control
- Luigi Giuri, Pietro Iglio:

A Formal Model for Role-Based Access Control with Constraints. 136-145 - Adrian Spalka:

The non-primitiveness of the simple-security property and its non-applicability to relational databases. 146-
Genealogy of Non-Interference
- Peter Ryan

:
A Genealogy of Non-Interference. 158-
Attacks
- Gavin Lowe:

Some new attacks upon security protocols. 162-169 - Yvo Desmedt:

Simmons' protocol is not free of subliminal channels. 170-175 - John P. McDermott, David M. Goldschlag:

Towards a model of storage jamming. 176-
What is an Attack on a Cryptographic Protocol?
- Paul F. Syverson:

What is an Attack on a Cryptographic Protocal? 188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














