


default search action
ISSS 2002: Tokyo, Japan
- Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa:

Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers. Lecture Notes in Computer Science 2609, Springer 2003, ISBN 3-540-00708-3 - Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas:

Towards Security and Privacy for Pervasive Computing. 1-15 - Frank Stajano:

Security for Whom?: The Shifting Security Assumptions of Pervasive Computing. 16-27 - Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda:

Active Authentication for Pervasive Computing Environments. 28-41 - Dan S. Wallach:

A Survey of Peer-to-Peer Security Issues. 42-57 - John C. Mitchell, Vanessa Teague:

Autonomous Nodes and Distributed Mechanisms. 58-83 - J. D. Tygar:

Privacy in Sensor Webs and Distributed Information Systems. 84-95 - Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov:

Negotiated Privacy: (Extended Abstract). 96-111 - Kazuhiko Kato, Yoshihiro Oyama:

SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. 112-132 - Yutaka Oiwa, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa:

Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report. 133-153 - Lujo Bauer

, Jarred Ligatti, David Walker:
Types and Effects for Non-interfering Program Monitors. 154-171 - Takahiro Shinagawa

, Kenji Kono, Takashi Masuda:
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. 172-184 - Algis Rudys, Dan S. Wallach:

Enforcing Java Run-Time Properties Using Bytecode Rewriting. 185-200 - Etsuya Shibayama

, Shigeki Hagihara, Naoki Kobayashi
, Shin-ya Nishizaki, Kenjiro Taura
, Takuo Watanabe:
AnZenMail: A Secure and Certified E-mail System. 201-216 - Reynald Affeldt

, Naoki Kobayashi
:
Formalization and Verification of a Mail Server in Coq. 217-233 - Hiroyuki Nishiyama, Fumio Mizoguchi:

Design and Implementation of Security System Based on Immune System. 234-248 - Wataru Yamazaki, Fumio Mizoguchi:

Design and Implementation of Access Control System for Smart Office Environment. 249-262 - Andrew D. Gordon, Alan Jeffrey:

Typing One-to-One and One-to-Many Correspondences in Security Protocols. 263-282 - George C. Necula, Robert R. Schneck:

Proof-Carrying Code with Untrusted Proof Rules. 283-298 - Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito:

Verification of Authentication Protocols Based on the Binding Relation. 299-316 - Cédric Fournet, Martín Abadi:

Hiding Names: Private Authentication in the Applied Pi Calculus. 317-338 - Ran Canetti, Catherine Meadows, Paul F. Syverson:

Environmental Requirements for Authentication Protocols. 339-355 - Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:

A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. 356-383 - Iliano Cervesato:

Data Access Specification and the Most Powerful Symbolic Attacker in MSR. 384-416 - Koji Hasebe, Mitsuhiro Okada:

A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. 417-440 - Kazuhiro Ogata, Kokichi Futatsugi:

Formal Analysis of the iKP Electronic Payment Protocols. 441-460 - Akira Mori, Kokichi Futatsugi:

CafeOBJ as a Tool for Behavioral System Verification. 461-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-01 23:23 CEST by the 







