Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
An environment for security protocol intrusion detection
Journal of Computer Security
Cryptographic Design Vulnerabilities
Computer
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Study on strand space model theory
Journal of Computer Science and Technology
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
A derivation system and compositional logic for security protocols
Journal of Computer Security
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
Potential weaknesses of AuthA password-authenticated key agreement protocols
Computer Standards & Interfaces
Breaking up is hard to do: modeling security threats for smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A framework for compositional verification of security protocols
Information and Computation
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
Safely composing security protocols
Formal Methods in System Design
Reusing Static Keys in Key Agreement Protocols
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Obtaining universally compoable security: towards the bare bones of trust
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Safely composing security protocols
FSTTCS'07 Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science
The initial costs and maintenance costs of protocols
Proceedings of the 13th international conference on Security protocols
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Model checking the security of multi-protocol systems
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
EC-RAC: enriching a capacious RFID attack collection
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Understanding abstractions of secure channels
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Highly-efficient universally-composable commitments based on the DDH assumption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Towards a framework for autonomic security protocols
Proceedings of the 11th international conference on Security Protocols
Secure sessions from weak secrets
Proceedings of the 11th international conference on Security Protocols
On the existence of related-key oracles in cryptosystems based on block ciphers
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
On the security of the WinRAR encryption method
ISC'05 Proceedings of the 8th international conference on Information Security
Cryptographic agility and its relation to circular encryption
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Generalized environmental security from number theoretic assumptions
TCC'06 Proceedings of the Third conference on Theory of Cryptography
On the joint security of encryption and signature, revisited
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Might financial cryptography kill financial innovation? --- the curious case of EMV
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Secure composition of protocols
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Security goals and protocol transformations
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
Breaking cell phone authentication: vulnerabilities in AKA, IMS and Android
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 0.00 |