Login / Signup
TOSCA
2002
2006
2008
2012
2002
2012
Keyphrases
Publications
volume 6993, 2012
Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers
TOSCA
6993 (2012)
2011
Sreekanth Malladi
Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR.
TOSCA
(2011)
Joeri de Ruiter
,
Erik Poll
Formal Analysis of the EMV Protocol Suite.
TOSCA
(2011)
Marieke Huisman
,
Henri-Charles Blondeel
Model-Checking Secure Information Flow for Multi-threaded Programs.
TOSCA
(2011)
Michael Backes
,
Catalin Hritcu
,
Matteo Maffei
Union and Intersection Types for Secure Protocol Implementations.
TOSCA
(2011)
Zhengqin Luo
,
Tamara Rezk
,
Manuel Serrano
Automated Code Injection Prevention for Web Applications.
TOSCA
(2011)
Morten Dahl
,
Stéphanie Delaune
,
Graham Steel
Formal Analysis of Privacy for Anonymous Location Based Services.
TOSCA
(2011)
Moez Ben MBarka
,
Francine Krief
,
Olivier Ly
Modeling Long-Term Signature Validation for Resolution of Dispute.
TOSCA
(2011)
Florent Jacquemard
,
Étienne Lozes
,
Ralf Treinen
,
Jules Villard
Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus.
TOSCA
(2011)
Joshua D. Guttman
Security Goals and Protocol Transformations.
TOSCA
(2011)
Véronique Cortier
Secure Composition of Protocols.
TOSCA
(2011)
Ueli Maurer
Constructive Cryptography - A New Paradigm for Security Definitions and Proofs.
TOSCA
(2011)
Michael Backes
,
Matteo Maffei
,
Kim Pecina
,
Raphael M. Reischuk
G2C: Cryptographic Protocols from Goal-Driven Specifications.
TOSCA
(2011)