Formal Aspects of Security First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers /
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Edition: | 1st ed. 2003. |
Series: | Lecture Notes in Computer Science,
2629 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Keynote Talk
- Lifting Reference Monitors from the Kernel
- Invited Talks I
- Authenticity Types for Cryptographic Protocols
- Verifying the SET Protocol: Overview
- Protocol Verification
- Interacting State Machines: A Stateful Approach to Proving Security
- Automatic Approximation for the Verification of Cryptographic Protocols
- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis
- Invited Talks II
- Critical Critical Systems
- Analysing Security Protocols
- Analysis of Protocols
- Analysis of Probabilistic Contract Signing
- Security Analysis of (Un-) Fair Non-repudiation Protocols
- Modeling Adversaries in a Logic for Security Protocol Analysis
- Security Modelling and Reasonning
- Secure Self-certified Code for Java
- Z Styles for Security Properties and Modern User Interfaces
- Invited Talks III
- Cryptographic Challenges: The Past and the Future
- TAPS: The Last Few Slides
- Intrusion Detection Systems and Liveness
- Formal Specification for Fast Automatic IDS Training
- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area
- Revisiting Liveness Properties in the Context of Secure Systems.