Volume 4,
Number 1-2,
February 2005
- Serge Autexier, Iliano Cervesato, Heiko Mantel:
Preface to the special issue of selected papers from FCS/VERIFY 2002.
1
Electronic Edition (link) BibTeX
- Jay Ligatti, Lujo Bauer, David Walker:
Edit automata: enforcement mechanisms for run-time security policies.
2-16
Electronic Edition (link) BibTeX
- Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
An overview of the verification of SET.
17-28
Electronic Edition (link) BibTeX
- Joshua D. Guttman, Amy L. Herzog:
Rigorous automated network security management.
29-48
Electronic Edition (link) BibTeX
- Ralf Küsters:
On the decidability of cryptographic protocols with open-ended data structures.
49-70
Electronic Edition (link) BibTeX
- Kong-wei Lye, Jeannette M. Wing:
Game strategies in network security.
71-86
Electronic Edition (link) BibTeX
- Christian Skalka, Scott F. Smith:
Static use-based object confinement.
87-104
Electronic Edition (link) BibTeX
- Kyung-suk Lhee, Steve J. Chapin:
Detection of file-based race conditions.
105-119
Electronic Edition (link) BibTeX
- Yun Bai, Yan Zhang, Vijay Varadharajan:
On the sequence of authorization policy transformations.
120-131
Electronic Edition (link) BibTeX
Volume 4,
Number 3,
June 2005
Volume 4,
Number 4,
October 2005
- Colin Boyd, Wenbo Mao:
Preface to the special issue on ISC 2003.
227-227
Electronic Edition (link) BibTeX
- David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
Fujisaki-Okamoto hybrid encryption revisited.
228-241
Electronic Edition (link) BibTeX
- Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively secure signature schemes.
242-252
Electronic Edition (link) BibTeX
- Sigrid Gürgens, Carsten Rudolph, Holger Vogt:
On the security of fair non-repudiation protocols.
253-262
Electronic Edition (link) BibTeX
- Adrian Baldwin, Simon Shiu:
Enabling shared audit data.
263-276
Electronic Edition (link) BibTeX
- Mikhail J. Atallah, Jiangtao Li:
Secure outsourcing of sequence comparisons .
277-287
Electronic Edition (link) BibTeX
- Yukio Itakura, Shigeo Tsujii:
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures.
288-296
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:02:18 2009
by Michael Ley (ley@uni-trier.de)