Login / Signup
Formal Aspects in Security and Trust
2004
2007
2012
2004
2012
Keyphrases
Publications
volume 7140, 2012
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers
Formal Aspects in Security and Trust
7140 (2012)
2011
Riccardo Focardi
,
Flaminia L. Luccio
Secure Recharge of Disposable RFID Tickets.
Formal Aspects in Security and Trust
(2011)
Thomas Gibson-Robinson
,
Gavin Lowe
Analysing Applications Layered on Unilaterally Authenticating Protocols.
Formal Aspects in Security and Trust
(2011)
Ben Smyth
,
Mark Ryan
,
Liqun Chen
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes.
Formal Aspects in Security and Trust
(2011)
Arnaud Fontaine
,
Samuel Hym
,
Isabelle Simplot-Ryl
Verifiable Control Flow Policies for Java Bytecode.
Formal Aspects in Security and Trust
(2011)
Willem De Groef
,
Dominique Devriese
,
Frank Piessens
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation.
Formal Aspects in Security and Trust
(2011)
Mário S. Alvim
,
Miguel E. Andrés
,
Konstantinos Chatzikokolakis
,
Pierpaolo Degano
,
Catuscia Palamidessi
Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Formal Aspects in Security and Trust
(2011)
Sibylle B. Fröschle
,
Nils Sommer
Concepts and Proofs for Configuring PKCS#11.
Formal Aspects in Security and Trust
(2011)
Sebastian Mödersheim
Diffie-Hellman without Difficulty.
Formal Aspects in Security and Trust
(2011)
Timothy L. Hinrichs
,
William C. Garrison III
,
Adam J. Lee
,
Skip Saunders
,
John C. Mitchell
TBA : A Hybrid of Logic and Extensional Access Control Systems.
Formal Aspects in Security and Trust
(2011)
Mohammad Torabi Dashti
,
Jan Cederquist
,
Yanjing Wang
Risk Balance in Optimistic Non-repudiation Protocols.
Formal Aspects in Security and Trust
(2011)
Luciano Bello
,
Eduardo Bonelli
On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow.
Formal Aspects in Security and Trust
(2011)
Simon N. Foley
,
Samane Abdi
Avoiding Delegation Subterfuge Using Linked Local Permission Names.
Formal Aspects in Security and Trust
(2011)
Robert Grabowski
,
Martin Hofmann
,
Keqin Li
Type-Based Enforcement of Secure Programming Guidelines - Code Injection Prevention at SAP.
Formal Aspects in Security and Trust
(2011)
Mihhail Aizatulin
,
François Dupressoir
,
Andrew D. Gordon
,
Jan Jürjens
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge.
Formal Aspects in Security and Trust
(2011)
Richard Gay
,
Heiko Mantel
,
Barbara Sprick
Service Automata.
Formal Aspects in Security and Trust
(2011)
Barbara Espinoza
,
Geoffrey Smith
Min-Entropy Leakage of Channels in Cascade.
Formal Aspects in Security and Trust
(2011)
Behnam Sattarzadeh
,
Mehran S. Fallah
Is Cryptyc Able to Detect Insider Attacks?
Formal Aspects in Security and Trust
(2011)
volume 6561, 2011
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers
Formal Aspects in Security and Trust
6561 (2011)
2010
Tim Muller
Semantics of Trust.
Formal Aspects in Security and Trust
(2010)
Francesco Ballardin
,
Massimo Merro
A Calculus for the Analysis of Wireless Network Security Protocols.
Formal Aspects in Security and Trust
(2010)
Naipeng Dong
,
Hugo L. Jonker
,
Jun Pang
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus.
Formal Aspects in Security and Trust
(2010)
Jason Crampton
Cryptographic Enforcement of Role-Based Access Control.
Formal Aspects in Security and Trust
(2010)
Dusko Pavlovic
Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks.
Formal Aspects in Security and Trust
(2010)
Max I. Kanovich
,
Tajana Ban Kirigin
,
Vivek Nigam
,
Andre Scedrov
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems.
Formal Aspects in Security and Trust
(2010)
Sibylle B. Fröschle
,
Nils Sommer
Reasoning with Past to Prove PKCS#11 Keys Secure.
Formal Aspects in Security and Trust
(2010)
Bruno Conchinha
,
David A. Basin
,
Carlos Caleiro
Efficient Decision Procedures for Message Deducibility and Static Equivalence.
Formal Aspects in Security and Trust
(2010)
Barbara Kordy
,
Sjouke Mauw
,
Sasa Radomirovic
,
Patrick Schweitzer
Foundations of Attack-Defense Trees.
Formal Aspects in Security and Trust
(2010)
Mana Taghdiri
,
Gregor Snelting
,
Carsten Sinz
Information Flow Analysis via Path Condition Refinement.
Formal Aspects in Security and Trust
(2010)
Raphaël Khoury
,
Nadia Tawbi
Corrective Enforcement of Security Policies.
Formal Aspects in Security and Trust
(2010)
Stéphanie Delaune
,
Steve Kremer
,
Mark Dermot Ryan
,
Graham Steel
A Formal Analysis of Authentication in the TPM.
Formal Aspects in Security and Trust
(2010)
Clément Hurlin
,
Hélène Kirchner
Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction.
Formal Aspects in Security and Trust
(2010)
Meilof Veeningen
,
Benne de Weger
,
Nicola Zannone
Modeling Identity-Related Properties and Their Privacy Strength.
Formal Aspects in Security and Trust
(2010)
Allaa Kamil
,
Gavin Lowe
Understanding Abstractions of Secure Channels.
Formal Aspects in Security and Trust
(2010)
volume 5983, 2010
Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers
Formal Aspects in Security and Trust
5983 (2010)