


default search action
FOSAD 2004/2005
- Alessandro Aldini
, Roberto Gorrieri, Fabio Martinelli:
Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures. Lecture Notes in Computer Science 3655, Springer 2005, ISBN 3-540-28955-0
FOSAD 2004 (6-11 September 2004)
- Michael Backes, Birgit Pfitzmann, Michael Waidner:
Justifying a Dolev-Yao Model Under Active Attacks. 1-41 - Jan Jürjens:
Model-Based Security Engineering with UML. 42-77 - François Koeune, François-Xavier Standaert:
A Tutorial on Physical Security and Side-Channel Attacks. 78-108 - Riccardo Focardi:
Static Analysis of Authentication. 109-132
FOSAD 2005 (19-24 September 2005)
- Gilles Barthe, Guillaume Dufay:
Formal Methods for Smartcard Security. 133-177 - Elisa Bertino, Ji-Won Byun, Ninghui Li:
Privacy-Preserving Database Systems. 178-206 - Hervé Debar, Jouni Viinikka:
Intrusion Detection: Introduction to Intrusion Detection and Security Information Management. 207-236 - Paolo Giorgini
, Fabio Massacci, Nicola Zannone
:
Security and Trust Requirements Engineering. 237-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.