default search action
ISSS 2002: Tokyo, Japan
- Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa:
Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers. Lecture Notes in Computer Science 2609, Springer 2003, ISBN 3-540-00708-3 - Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas:
Towards Security and Privacy for Pervasive Computing. 1-15 - Frank Stajano:
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. 16-27 - Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda:
Active Authentication for Pervasive Computing Environments. 28-41 - Dan S. Wallach:
A Survey of Peer-to-Peer Security Issues. 42-57 - John C. Mitchell, Vanessa Teague:
Autonomous Nodes and Distributed Mechanisms. 58-83 - J. D. Tygar:
Privacy in Sensor Webs and Distributed Information Systems. 84-95 - Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov:
Negotiated Privacy: (Extended Abstract). 96-111 - Kazuhiko Kato, Yoshihiro Oyama:
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. 112-132 - Yutaka Oiwa, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa:
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report. 133-153 - Lujo Bauer, Jarred Ligatti, David Walker:
Types and Effects for Non-interfering Program Monitors. 154-171 - Takahiro Shinagawa, Kenji Kono, Takashi Masuda:
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. 172-184 - Algis Rudys, Dan S. Wallach:
Enforcing Java Run-Time Properties Using Bytecode Rewriting. 185-200 - Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe:
AnZenMail: A Secure and Certified E-mail System. 201-216 - Reynald Affeldt, Naoki Kobayashi:
Formalization and Verification of a Mail Server in Coq. 217-233 - Hiroyuki Nishiyama, Fumio Mizoguchi:
Design and Implementation of Security System Based on Immune System. 234-248 - Wataru Yamazaki, Fumio Mizoguchi:
Design and Implementation of Access Control System for Smart Office Environment. 249-262 - Andrew D. Gordon, Alan Jeffrey:
Typing One-to-One and One-to-Many Correspondences in Security Protocols. 263-282 - George C. Necula, Robert R. Schneck:
Proof-Carrying Code with Untrusted Proof Rules. 283-298 - Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito:
Verification of Authentication Protocols Based on the Binding Relation. 299-316 - Cédric Fournet, Martín Abadi:
Hiding Names: Private Authentication in the Applied Pi Calculus. 317-338 - Ran Canetti, Catherine Meadows, Paul F. Syverson:
Environmental Requirements for Authentication Protocols. 339-355 - Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. 356-383 - Iliano Cervesato:
Data Access Specification and the Most Powerful Symbolic Attacker in MSR. 384-416 - Koji Hasebe, Mitsuhiro Okada:
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. 417-440 - Kazuhiro Ogata, Kokichi Futatsugi:
Formal Analysis of the iKP Electronic Payment Protocols. 441-460 - Akira Mori, Kokichi Futatsugi:
CafeOBJ as a Tool for Behavioral System Verification. 461-470
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.