default search action
11. ASIAN 2006: Tokyo, Japan
- Mitsu Okada, Ichiro Satoh:
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4435, Springer 2008, ISBN 978-3-540-77504-1 - Akira Matsunaga, Tsutomu Matsumoto:
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. 1-12 - Yannick Chevalier, Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks. 13-27 - Huibiao Zhu, Geguang Pu, Jifeng He:
A Denotational Approach to Scope-Based Compensable Flow Language for Web Service. 28-36 - Tarjei K. Mandt, Chik How Tan:
Certificateless Authenticated Two-Party Key Agreement Protocols. 37-44 - Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
FORM : A Federated Rights Expression Model for Open DRM Frameworks. 45-59 - Masatomo Hashimoto:
A Method of Safety Analysis for Runtime Code Update. 60-74 - Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jensen, David A. Schmidt:
Automata-Based Confidentiality Monitoring. 75-89 - Nai Xia, Bing Mao, Qingkai Zeng, Li Xie:
Efficient and Practical Control Flow Monitoring for Program Security. 90-104 - Ming-Hsien Tsai, Bow-Yaw Wang:
Modular Formalization of Reactive Modules in COQ. 105-119 - Alejandro Russo, John Hughes, David A. Naumann, Andrei Sabelfeld:
Closing Internal Timing Channels by Transformation. 120-135 - Lucia Acciai, Michele Boreale:
Responsiveness in Process Calculi. 136-150 - Vincent Bernat, Hubert Comon-Lundh:
Normal Proofs in Intruder Theories. 151-166 - Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad:
Breaking and Fixing Public-Key Kerberos. 167-181 - Gergei Bana, Payman Mohassel, Till Stegers:
Computational Soundness of Formal Indistinguishability and Static Equivalence. 182-196 - Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic. 197-213 - Zhaohui Luo:
A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations. 214-222 - Slawomir Lasota, David Nowak, Yu Zhang:
On Completeness of Logical Relations for Monadic Types. 223-230 - Zining Cao:
A Spatial Logical Characterisation of Context Bisimulation. 231-239 - Qin Ma, Luc Maranget:
Information Hiding in the Join Calculus. 240-247 - Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa:
Modeling Urgency in Component-Based Real-Time Systems. 248-255 - Khandoker Asadul Islam, Yoshimichi Watanabe:
Maintaining Data Consistency of XML Databases Using Verification Techniques. 256-263 - Souhei Ito, Shigeki Hagihara, Naoki Yonezaki:
An Operational Semantics of Program Dependence Graphs for Unstructured Programs. 264-271 - Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival:
Combination of Abstractions in the ASTRÉE Static Analyzer. 272-300 - Naokata Shikuma, Atsushi Igarashi:
Proving Noninterference by a Fully Complete Translation to the Simply Typed lambda-Calculus. 301-315 - Ming-Hsien Tsai, Bow-Yaw Wang:
Formalization of CTL* in Calculus of Inductive Constructions. 316-330 - Corneliu Popeea, Wei-Ngan Chin:
Inferring Disjunctive Postconditions. 331-345 - Reynald Affeldt, Nicolas Marti:
An Approach to Formal Verification of Arithmetic Functions in Assembly. 346-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.