Security Analysis of a Probabilistic Non-repudiation Protocol
PAPM-PROBMIV '02 Proceedings of the Second Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification
Bisimulation and Unwinding for Verifying Possibilistic Security Properties
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
A probabilistic approach to information hiding
Programming methodology
Action Systems for Security Specification
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
What is Intransitive Noninterference?
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A process-algebraic approach for the analysis of probabilistic noninterference
Journal of Computer Security
Information flow in secure contexts
Journal of Computer Security
Information flow security in dynamic contexts
Journal of Computer Security
Unwinding in Information Flow Security
Electronic Notes in Theoretical Computer Science (ENTCS)
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
Analysing the information flow properties of object-capability patterns
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Unwinding conditions for security in imperative languages
LOPSTR'04 Proceedings of the 14th international conference on Logic Based Program Synthesis and Transformation
Secure requirements elicitation through triggered message sequence charts
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Verifying persistent security properties
Computer Languages, Systems and Structures
Coinductive unwinding of security-relevant hyperproperties
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Hi-index | 0.00 |