Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("ZDANCEWIC, Steve")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 27

  • Page / 2
Export

Selection :

  • and

Encoding Information Flow in AURALIMIN JIA; ZDANCEWIC, Steve.ACM SIGPLAN notices. 2009, Vol 44, Num 8, pp 7-19, issn 1523-2867, 13 p.Article

Preserving Secrecy Under RefinementALUR, Rajeev; CERNY, Pavol; ZDANCEWIC, Steve et al.Lecture notes in computer science. 2006, pp 107-118, issn 0302-9743, isbn 3-540-35904-4, 12 p.Conference Paper

Secure information flow and CPSZDANCEWIC, Steve; MYERS, Andrew C.Lecture notes in computer science. 2001, pp 46-61, issn 0302-9743, isbn 3-540-41862-8Conference Paper

Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA '06)DEGANO, Pierpaolo; KÜSTERS, Ralf; VIGANO, Luca et al.Information and computation (Print). 2008, Vol 206, Num 2-4, issn 0890-5401, 361 p.Conference Proceedings

Run-time principals in information-flow type systemsTSE, Stephen; ZDANCEWIC, Steve.IEEE symposium on security and privacy. 2004, pp 179-193, isbn 0-7695-2136-3, 1Vol, 15 p.Conference Paper

Arrows for secure information flowPENG LI; ZDANCEWIC, Steve.Theoretical computer science. 2010, Vol 411, Num 19, pp 1974-1994, issn 0304-3975, 21 p.Conference Paper

A design for a security-typed language with certificate-based declassificationTSE, Stephen; ZDANCEWIC, Steve.Lecture notes in computer science. 2005, pp 279-294, issn 0302-9743, isbn 3-540-25435-8, 16 p.Conference Paper

On the relationships between models in protocol verificationMÖDERSHEIM, Sebastian.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 291-311, issn 0890-5401, 21 p.Conference Paper

Preservation of probabilistic information flow under refinementSANTEN, Thomas.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 213-249, issn 0890-5401, 37 p.Conference Paper

Secure program partitioningZDANCEWIC, Steve; LANTIAN ZHENG; NYSTROM, Nathaniel et al.ACM transactions on computer systems. 2002, Vol 20, Num 3, pp 283-328, issn 0734-2071Article

Analysis of dynamic policiesPRASAD SISTLA, A; MIN ZHOU.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 185-212, issn 0890-5401, 28 p.Conference Paper

Authenticating ad hoc networks by comparison of short digestsNGUYEN, L. H; ROSCOE, A. W.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 250-271, issn 0890-5401, 22 p.Conference Paper

Fair multi-party contract signing using private contract signaturesMUKHAMEDOV, Aybek; RYAN, Mark D.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 272-290, issn 0890-5401, 19 p.Conference Paper

Hierarchical combination of intruder theoriesCHEVALIER, Yannick; RUSINOWITCH, Michael.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 352-377, issn 0890-5401, 26 p.Conference Paper

Combining events and threads for scalable network services : Implementation and evaluation of monadic, application-level concurrency primitivesPENG LI; ZDANCEWIC, Steve.ACM SIGPLAN notices. 2007, Vol 42, Num 6, pp 189-199, issn 1523-2867, 11 p.Conference Paper

HardBound : Architectural Support for Spatial Safety of the C Programming LanguageDEVIETTI, Joe; BLUNDELL, Colin; MARTIN, Milo M. K et al.ACM SIGPLAN notices. 2008, Vol 43, Num 3, pp 103-114, issn 1523-2867, 12 p.Conference Paper

Anonymity protocols as noisy channelsCHATZIKOKOLAKIS, Konstantinos; PALAMIDESSI, Catuscia; PANANGADEN, Prakash et al.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 378-401, issn 0890-5401, 24 p.Conference Paper

HardBound : Architectural Support for Spatial Safety of the C Programming LanguageDEVIETTI, Joe; BLUNDELL, Colin; MARTIN, Milo M. K et al.Operating systems review. 2008, Vol 42, Num 2, pp 103-114, issn 0163-5980, 12 p.Conference Paper

Advanced control flow in Java Card programmingPENG LI; ZDANCEWIC, Steve.ACM SIGPLAN notices. 2004, Vol 39, Num 7, pp 165-174, issn 1523-2867, 10 p.Conference Paper

Secure information flow via linear continuationsZDANCEWIC, Steve; MYERS, Andrew C.Higher-order and symbolic computation. 2002, Vol 15, Num 2-3, pp 209-234, issn 1388-3690, 26 p.Conference Paper

Generative Type Abstraction and Type-level ComputationWEIRICH, Stephanie; VYTINIOTIS, Dimitrios; ZDANCEWIC, Steve et al.ACM SIGPLAN notices. 2011, Vol 46, Num 1, pp 227-239, issn 1523-2867, 13 p.Conference Paper

AURA: A Programming Language for Authorization and AuditLIMIN JIA; VAUGHAN, Jeffrey A; MAZURAK, Karl et al.ACM SIGPLAN notices. 2008, Vol 43, Num 9, pp 27-38, issn 1523-2867, 12 p.Conference Paper

Breaking and fixing public-key KerberosCERVESATO, Iliano; JAGGARD, Aaron D; SCEDROV, Andre et al.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 402-424, issn 0890-5401, 23 p.Conference Paper

Rule-based static analysis of network protocol implementationsUDREA, Octavian; LUMEZANU, Cristian; FOSTER, Jeffrey S et al.Information and computation (Print). 2008, Vol 206, Num 2-4, pp 130-157, issn 0890-5401, 28 p.Conference Paper

CETS: Compiler-Enforced Temporal Safety for CNAGARAKATTE, Santosh; JIANZHOU ZHAO; MARTIN, Milo M. K et al.ACM SIGPLAN notices. 2010, Vol 45, Num 8, pp 31-40, issn 1523-2867, 10 p.Conference Paper

  • Page / 2