Sign in
WITS
2005
2005
2005
Keyphrases
Publications
2005
Alwyn Goodloe
,
Carl A. Gunter
,
Mark-Oliver Stehr
Formal prototyping in early stages of protocol design.
WITS
(2005)
Rachid Echahed
,
Frédéric Prost
Handling declared information leakage: extended abstract.
WITS
(2005)
Iliano Cervesato
,
Aaron D. Jaggard
,
Andre Scedrov
,
Christopher Walstad
Specifying Kerberos 5 cross-realm authentication.
WITS
(2005)
Massimo Bartoletti
,
Pierpaolo Degano
,
Gian Luigi Ferrari
Policy framings for access control.
WITS
(2005)
Riccardo Focardi
,
Matteo Maffei
,
Francesco Placella
Inferring authentication tags.
WITS
(2005)
Steffen M. Hansen
,
Jakob Skriver
,
Hanne Riis Nielson
Using static analysis to validate the SAML single sign-on protocol.
WITS
(2005)
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005
WITS
(2005)
Peter Y. A. Ryan
A variant of the Chaum voter-verifiable scheme.
WITS
(2005)
Bart Jacobs
,
Wolter Pieters
,
Martijn Warnier
Statically checking confidentiality via dynamic labels.
WITS
(2005)
Adam Barth
,
John C. Mitchell
Enterprise privacy promises and enforcement.
WITS
(2005)