Sign in
ASIAN
1995
2000
2004
2009
1995
2009
Keyphrases
Publications
2009
Robert Grabowski
,
Lennart Beringer
Noninterference with Dynamic Security Domains and Policies.
ASIAN
(2009)
Matt Henricksen
A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers.
ASIAN
(2009)
Anguraj Baskar
,
Ramaswamy Ramanujam
,
S. P. Suresh
A Dolev-Yao Model for Zero Knowledge.
ASIAN
(2009)
Sergiu Bursuc
,
Hubert Comon-Lundh
,
Stéphanie Delaune
Deducibility Constraints.
ASIAN
(2009)
Klaas Ole Kürtz
,
Henning Schnoor
,
Thomas Wilke
A Simulation-Based Treatment of Authenticated Message Exchange.
ASIAN
(2009)
Jean Goubault-Larrecq
"Logic Wins!".
ASIAN
(2009)
Martin Gagné
,
Pascal Lafourcade
,
Yassine Lakhnech
,
Reihaneh Safavi-Naini
Automated Security Proof for Symmetric Encryption Modes.
ASIAN
(2009)
Jianhong Zhang
,
Hua Chen
,
Shengnan Gao
,
Yixian Yang
A Special Proxy Signature Scheme with Multi-warrant.
ASIAN
(2009)
Steve Kremer
,
Antoine Mercier
,
Ralf Treinen
Reducing Equational Theories for the Decision of Static Equivalence.
ASIAN
(2009)
Naoki Kobayashi
Higher-Order Program Verification and Language-Based Security.
ASIAN
(2009)
Deqing Zou
,
Jinjiu Long
,
Hai Jin
Trusted Deployment of Virtual Execution Environment in Grid Systems.
ASIAN
(2009)
Yoshihiko Kakutani
A Logic for Formal Verification of Quantum Programs.
ASIAN
(2009)
volume 5913, 2009
Advances in Computer Science - ASIAN 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings
ASIAN
5913 (2009)
volume 4435, 2008
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers
ASIAN
4435 (2008)
2007
Sriperumbuduru Kandala Simhalu
,
Keiji Takeda
Browser Based Agile E-Voting System.
ASIAN
(2007)
Hyoungshick Kim
Scalable DRM System for Media Portability.
ASIAN
(2007)
Elie Bursztein
,
Jean Goubault-Larrecq
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks.
ASIAN
(2007)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Computational Semantics for Basic Protocol Logic - A Stochastic Approach.
ASIAN
(2007)
Joshua D. Guttman
How to do Things with Cryptographic Protocols.
ASIAN
(2007)
Mengjun Li
,
Ti Zhou
,
Zhoujun Li
,
Huowang Chen
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
ASIAN
(2007)
Takahiro Kosakai
,
Toshiyuki Maeda
,
Akinori Yonezawa
Compiling C Programs into a Strongly Typed Assembly Language.
ASIAN
(2007)
Junji Nakazato
,
Lihua Wang
,
Akihiro Yamamura
Privacy Enhancing Credentials.
ASIAN
(2007)
Wilson Naik Bhukya
,
Suneel Kumar Kommuru
,
Atul Negi
Masquerade Detection Based Upon GUI User Profiling in Linux Systems.
ASIAN
(2007)
Imad M. Abbadi
Digital Rights Management Using a Master Control Device.
ASIAN
(2007)
Atsushi Sakurai
,
Takashi Minohara
,
Ryota Sato
,
Keisuke Mizutani
One-Time Receiver Address in IPv6 for Protecting Unlinkability.
ASIAN
(2007)
Kazuhiko Kato
Modeling and Virtualization for Secure Computing Environments.
ASIAN
(2007)
Gavin O'Gorman
,
Stephen Blott
Large Scale Simulation of Tor: .
ASIAN
(2007)
Michele Bugliesi
,
Damiano Macedonio
,
Sabina Rossi
Static vs Dynamic Typing for Access Control in Pi-Calculus.
ASIAN
(2007)
Jungsuk Song
,
Hayato Ohba
,
Hiroki Takakura
,
Yasuo Okabe
,
Kenji Ohira
,
Yongjin Kwon
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.
ASIAN
(2007)
Samiha Ayed
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
An Integrated Model for Access Control and Information Flow Requirements.
ASIAN
(2007)
Seokwoo Choi
,
Heewan Park
,
Hyun-il Lim
,
Taisook Han
A Static Birthmark of Binary Executables Based on API Call Structure.
ASIAN
(2007)
Harshit J. Shah
,
R. K. Shyamasundar
On Run-Time Enforcement of Policies.
ASIAN
(2007)
Ali Borji
Combining Heterogeneous Classifiers for Network Intrusion Detection.
ASIAN
(2007)
Mohammad Jafari
,
Mohammad Fathian
Management Advantages of Object Classification in Role-Based Access Control (RBAC).
ASIAN
(2007)
E. Ramirez-Silva
,
Marc Dacier
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces.
ASIAN
(2007)
Tomohiro Shioya
,
Yoshihiro Oyama
,
Hideya Iwasaki
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.
ASIAN
(2007)
Vitaly Shmatikov
,
Ming-Hsiu Wang
Secure Verification of Location Claims with Simultaneous Distance Modification.
ASIAN
(2007)
Muhammad Torabi Dashti
,
Yanjing Wang
Risk Balance in Exchange Protocols.
ASIAN
(2007)
Andrei Sabelfeld
Dimensions of Declassification in Theory and Practice.
ASIAN
(2007)
Han Gao
,
Chiara Bodei
,
Pierpaolo Degano
,
Hanne Riis Nielson
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.
ASIAN
(2007)
Petros Belsis
,
Stefanos Gritzalis
,
Christos Skourlas
,
Vassilis Tsoukalas
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments.
ASIAN
(2007)
Gurvan Le Guernic
Information Flow Testing.
ASIAN
(2007)
volume 4846, 2007
Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings
ASIAN
4846 (2007)
2006
Yannick Chevalier
,
Mounira Kourjieh
A Symbolic Intruder Model for Hash-Collision Attacks.
ASIAN
(2006)
Corneliu Popeea
,
Wei-Ngan Chin
Inferring Disjunctive Postconditions.
ASIAN
(2006)
Lucia Acciai
,
Michele Boreale
Responsiveness in Process Calculi.
ASIAN
(2006)
Arnab Roy
,
Anupam Datta
,
Ante Derek
,
John C. Mitchell
,
Jean-Pierre Seifert
Secrecy Analysis in Protocol Composition Logic.
ASIAN
(2006)
Souhei Ito
,
Shigeki Hagihara
,
Naoki Yonezaki
An Operational Semantics of Program Dependence Graphs for Unstructured Programs.
ASIAN
(2006)
Ming-Hsien Tsai
,
Bow-Yaw Wang
Formalization of CTL* in Calculus of Inductive Constructions.
ASIAN
(2006)
Ming-Hsien Tsai
,
Bow-Yaw Wang
Modular Formalization of Reactive Modules in COQ.
ASIAN
(2006)