The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE 25th Computer Security Foundations Symposium (2007)
Venice, Italy
July 6, 2007 to July 8, 2007
ISBN: 0-7695-2819-8
TABLE OF CONTENTS
Introduction
Preface (PDF)
pp. ix
Committees (PDF)
pp. x
Authorization
Cedric Fournet , Microsoft Research, United Kingdom
Moritz Becker , Microsoft Research, United Kingdom
pp. 3-15
Andrew Cirillo , DePaul University
Radha Jagadeesan , DePaul University
Corin Pitcher , DePaul University
James Riely , DePaul University
pp. 16-30
Cedric Fournet , Microsoft Research
Andrew Gordon , Microsoft Research
Sergio Maffeis , Imperial College
pp. 31-48
Multi-Layer Protocols and Key Conjuring
Prateek Gupta , VMWare, Inc.
pp. 49-63
Alwyn E. Goodloe , University of Pennsylvania, USA
Carl A. Gunter , University of Illinois at Urbana-Champaign, USA
pp. 64-78
Stephanie Delaune , LORIA, France
Veronique Cortier , LORIA, France
pp. 79-96
Protocols and Cryptographic Foundations
Bruno Blanchet , Ecole Normale Superieure, France
pp. 97-111
Ling Cheung , Massachusetts Institute of Technology
Dilsun Kaynar , Carnegie Mellon University
Ran Canetti , IBM Research
Olivier Pereira , Universite catholique de Louvain
pp. 125-139
Secure Implementation
James Heather , University of Surrey, UK
pp. 157-169
Ricardo Corin , MSR-INRIA Joint Centre; Microsoft Research; University of Twente
Pierre-Malo Denielou , MSR-INRIA Joint Centre; Microsoft Research
Cedric Fournet , MSR-INRIA Joint Centre; Microsoft Research
Karthikeyan Bhargavan , MSR-INRIA Joint Centre; Microsoft Research
James Leifer , MSR-INRIA Joint Centre
pp. 170-186
Ta-chung Tsai , Chalmers University of Technology, Sweden
Alejandro Russo , Chalmers University of Technology, Sweden
John Hughes , Chalmers University of Technology, Sweden
pp. 187-202
Information Flow
Paritosh Shroff , Johns Hopkins University
Scott Smith , Johns Hopkins University
Mark Thober , Johns Hopkins University
pp. 203-217
Gurvan Le Guernic , IRISA, France; Kansas State University, USA
pp. 218-232
Lennart Beringer , Universitat Munchen, Germany
Martin Hofmann , Universitat Munchen, Germany
pp. 233-248
Privacy
Hanne Riis Nielson , Technical University of Denmark, Denmark
pp. 249-264
Paul Rowe , University of Pennsylvania, USA
Andre Scedrov , University of Pennsylvania, USA
pp. 265-278
John Mitchell , Stanford University
Anupam Datta , Carnegie Mellon University
Adam Barth , Stanford University
pp. 279-294
20th Anniversary Invited Paper
Miranda Mowbray , HP Laboratories, Bristol
Dieter Gollmann , Hamburg University of Technology, Germany
pp. 295-310
Vulnerability Analysis and Information-Theoretic Security
Heiko Mantel , RWTH Aachen University, Germany
Henning Sudbrock , RWTH Aachen University, Germany
pp. 326-340
Catuscia Palamidessi , Ecole Polytechnique, France
Prakash Panangaden , McGill University, Canada
pp. 341-354
Security Protocol Analysis
Michael Backes , Saarland University, Germany
Agostino Cortesi , Ca'Foscari University, Italy
Matteo Maffei , Saarland University, Germany
pp. 355-369
Sibylle Froschle , University of Edinburgh, UK
pp. 370-384
Roberto Carbone , Universita di Genova, Italy
Alessandro Armando , Universita di Genova, Italy
pp. 385-396
Author Index
Author Index (PDF)
pp. 397
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool