Sign in
ISSS
1995
1998
2001
2004
1995
2004
Keyphrases
Publications
volume 3233, 2004
Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers
ISSS
3233 (2004)
2003
Koji Hasebe
,
Mitsuhiro Okada
Inferences on Honesty in Compositional Logic for Protocol Analysis.
ISSS
(2003)
Osamu Sato
,
Richard Potter
,
Mitsuharu Yamamoto
,
Masami Hagiya
UML Scrapbook and Realization of Snapshot Programming Environment.
ISSS
(2003)
Noriaki Yoshiura
Decision Procedures for Several Properties of Reactive System Specifications.
ISSS
(2003)
Matthew Harren
,
George C. Necula
Lightweight Wrappers for Interfacing with Binary Code in CCured.
ISSS
(2003)
Daigo Tomioka
,
Shin-ya Nishizaki
,
Ritsuya Ikeda
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack.
ISSS
(2003)
Fabrizio Baiardi
,
Alessandro Falleni
,
Riccardo Granchi
,
Fabio Martinelli
,
Marinella Petrocchi
,
Anna Vaccarelli
SEAS: A Secure E-Voting Applet System.
ISSS
(2003)
Ashraf Bhery
,
Shigeki Hagihara
,
Naoki Yonezaki
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties.
ISSS
(2003)
Akira Mori
Detecting Unknown Computer Viruses - A New Approach.
ISSS
(2003)
Kohei Suenaga
,
Yutaka Oiwa
,
Eijiro Sumii
,
Akinori Yonezawa
The Interface Definition Language for Fail-Safe C.
ISSS
(2003)
Hiroyuki Nishiyama
,
Yukinobu Mine
,
Fumio Mizoguchi
The Design of a Secure Distributed Devices System Based on Immunity.
ISSS
(2003)
Andrei Sabelfeld
,
Andrew C. Myers
A Model for Delimited Information Release.
ISSS
(2003)
Kazuhiro Ogata
,
Kokichi Futatsugi
Formal Analysis of the NetBill Electronic Commerce Protocol.
ISSS
(2003)
Frederick Butler
,
Iliano Cervesato
,
Aaron D. Jaggard
,
Andre Scedrov
Verifying Confidentiality and Authentication in Kerberos 5.
ISSS
(2003)
Bart Jacobs
,
Erik Poll
Java Program Verification at Nijmegen: Developments and Perspective.
ISSS
(2003)
Yasushi Shinjo
,
Yoshinori Nakata
,
Kozo Itano
Securing RPC with a Reference Monitor for System Calls.
ISSS
(2003)
Hirotake Abe
,
Kazuhiko Kato
Security Policy Descriptions Through the Use of Control Structure of a Target Program.
ISSS
(2003)
Weijiang Yu
,
Aloysius K. Mok
Formal Specification and Verification of Resource Bound Security Using PVS.
ISSS
(2003)
David P. Gilliam
Managing Information Technology Security Risk.
ISSS
(2003)
volume 2609, 2003
Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers
ISSS
2609 (2003)
2002
John C. Mitchell
,
Vanessa Teague
Autonomous Nodes and Distributed Mechanisms.
ISSS
(2002)
Lujo Bauer
,
Jarred Ligatti
,
David Walker
Types and Effects for Non-interfering Program Monitors.
ISSS
(2002)
Algis Rudys
,
Dan S. Wallach
Enforcing Java Run-Time Properties Using Bytecode Rewriting.
ISSS
(2002)
Cédric Fournet
,
Martín Abadi
Hiding Names: Private Authentication in the Applied Pi Calculus.
ISSS
(2002)
George C. Necula
,
Robert R. Schneck
Proof-Carrying Code with Untrusted Proof Rules.
ISSS
(2002)
Iliano Cervesato
,
Nancy A. Durgin
,
Patrick Lincoln
,
John C. Mitchell
,
Andre Scedrov
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis.
ISSS
(2002)
Ran Canetti
,
Catherine A. Meadows
,
Paul F. Syverson
Environmental Requirements for Authentication Protocols.
ISSS
(2002)
Roy H. Campbell
,
Jalal Al-Muhtadi
,
Prasad Naldurg
,
Geetanjali Sampemane
,
M. Dennis Mickunas
Towards Security and Privacy for Pervasive Computing.
ISSS
(2002)
Reynald Affeldt
,
Naoki Kobayashi
Formalization and Verification of a Mail Server in Coq.
ISSS
(2002)
Akira Mori
,
Kokichi Futatsugi
CafeOBJ as a Tool for Behavioral System Verification.
ISSS
(2002)
Etsuya Shibayama
,
Shigeki Hagihara
,
Naoki Kobayashi
,
Shin-ya Nishizaki
,
Kenjiro Taura
,
Takuo Watanabe
AnZenMail: A Secure and Certified E-mail System.
ISSS
(2002)
Koji Hasebe
,
Mitsuhiro Okada
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic.
ISSS
(2002)
Hiroyuki Nishiyama
,
Fumio Mizoguchi
Design and Implementation of Security System Based on Immune System.
ISSS
(2002)
Dan S. Wallach
A Survey of Peer-to-Peer Security Issues.
ISSS
(2002)
Kazuhiro Ogata
,
Kokichi Futatsugi
KP Electronic Payment Protocols.
ISSS
(2002)
Iliano Cervesato
Data Access Specification and the Most Powerful Symbolic Attacker in MSR.
ISSS
(2002)
Frank Stajano
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing.
ISSS
(2002)
Stanislaw Jarecki
,
Patrick Lincoln
,
Vitaly Shmatikov
Negotiated Privacy: (Extended Abstract).
ISSS
(2002)
Andrew D. Gordon
,
Alan Jeffrey
Typing One-to-One and One-to-Many Correspondences in Security Protocols.
ISSS
(2002)
J. D. Tygar
Privacy in Sensor Webs and Distributed Information Systems.
ISSS
(2002)
Wataru Yamazaki
,
Fumio Mizoguchi
Design and Implementation of Access Control System for Smart Office Environment.
ISSS
(2002)
Takahiro Shinagawa
,
Kenji Kono
,
Takashi Masuda
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains.
ISSS
(2002)
Kazuhiko Kato
,
Yoshihiro Oyama
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation.
ISSS
(2002)
Rudy Lauwereins
,
Chun Wong
,
Paul Marchal
,
Johan Vounckx
,
Patrick David
,
Stefaan Himpe
,
Francky Catthoor
,
Peng Yang
Managing Dynamic Concurrent Tasks in Embedded Real-Time Multimedia Systems.
ISSS
(2002)
Oliver Bringmann
,
Wolfgang Rosenstiel
,
Carsten Menn
Controller Estimation for FPGA Target Architectures during High-Level Synthesis.
ISSS
(2002)
Rainer Dömer
,
Andreas Gerstlauer
,
Wolfgang Müller
The Formal Execution Semantics of SpecC.
ISSS
(2002)
Paolo Ienne
,
Patrick Thiran
,
Giovanni De Micheli
,
Frederic Worm
An Adaptive Low-Power Transmission Scheme for On-Chip Networks.
ISSS
(2002)
Masami Hagiya
,
Ryo Takemura
,
Koichi Takahashi
,
Takamichi Saito
Verification of Authentication Protocols Based on the Binding Relation.
ISSS
(2002)
Yutaka Oiwa
,
Tatsurou Sekiguchi
,
Eijiro Sumii
,
Akinori Yonezawa
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report.
ISSS
(2002)
Kenta Matsumiya
,
Soko Aoki
,
Masana Murase
,
Hideyuki Tokuda
Active Authentication for Pervasive Computing Environments.
ISSS
(2002)