Engineering Secure Software and Systems
暂无分享,去创建一个
Gerhard Goos | Juris Hartmanis | Jan van Leeuwen | Riccardo Scandariato | Jan Jürjens | David Hutchison | Benjamin Livshits | B. Livshits | J. Hartmanis | J. V. Leeuwen | G. Goos | David Hutchison | J. Jürjens | R. Scandariato | J. Leeuwen
[1] [Isabelle]. , 1982, Revue de l'infirmiere.
[2] Wen-Guey Tzeng,et al. A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata , 1992, SIAM J. Comput..
[3] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[4] A. W. Roscoe. CSP and determinism in security modelling , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[5] Doron A. Peled,et al. Stutter-Invariant Temporal Properties are Expressible Without the Next-Time Operator , 1997, Inf. Process. Lett..
[6] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[7] Geoffrey Smith,et al. Probabilistic noninterference in a concurrent language , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[8] Fabio Massacci,et al. Formal Verification of Cardholder Registration in SET , 2000, ESORICS.
[9] David Sands,et al. Probabilistic noninterference for multi-threaded programs , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[10] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[11] Lawrence C. Paulson,et al. Mechanical Proofs about a Non-repudiation Protocol , 2001, TPHOLs.
[12] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[13] Mariëlle Stoelinga,et al. Alea jacta est : verification of probabilistic, real-time and parametric systems , 2002 .
[14] Geoffrey Smith,et al. Probabilistic noninterference through weak probabilistic bisimulation , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[15] Andrew C. Myers,et al. Observational determinism for concurrent program security , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[16] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[17] Giampaolo Bella,et al. Formal Correctness of Security Protocols , 2007 .
[18] Mark Ryan,et al. Automatic Verification of Privacy Properties in the Applied pi Calculus , 2008, IFIPTM.
[19] Tachio Terauchi,et al. A Type System for Observational Determinism , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[20] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[21] Mark Ryan,et al. Verifying privacy-type properties of electronic voting protocols , 2009, J. Comput. Secur..
[22] Heiko Mantel,et al. Flexible Scheduler-Independent Security , 2010, ESORICS.
[23] David Sands,et al. Assumptions and Guarantees for Compositional Noninterference , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[24] Rohit Chadha,et al. Automated Verification of Equivalence Properties of Cryptographic Protocols , 2012, ESOP.
[25] Giampaolo Bella,et al. Inductive study of confidentiality: for everyone , 2012, Formal Aspects of Computing.
[26] Giampaolo Bella,et al. Verifying Privacy by Little Interaction and No Process Equivalence , 2012, SECRYPT.
[27] Lawrence C. Paulson,et al. Verifying multicast-based security protocols using the inductive method , 2013, SAC '13.