{"title":"Enforcing Java Run-Time Properties Using Bytecode Rewriting","authors":"A. Rudys, D. Wallach","doi":"10.1007/3-540-36532-X_12","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_12","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Environmental Requirements for Authentication Protocols","authors":"R. Canetti, C. Meadows, P. Syverson","doi":"10.1007/3-540-36532-X_21","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_21","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hiding Names: Private Authentication in the Applied Pi Calculus","authors":"C. Fournet, M. Abadi","doi":"10.1007/3-540-36532-X_20","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_20","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Nodes and Distributed Mechanisms","authors":"John C. Mitchell, Vanessa Teague","doi":"10.1007/3-540-36532-X_5","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_5","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122105468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic","authors":"Koji Hasebe, M. Okada","doi":"10.1007/3-540-36532-X_24","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_24","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security for Whom?: The Shifting Security Assumptions of Pervasive Computing","authors":"F. Stajano","doi":"10.1007/3-540-36532-X_2","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_2","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Access Control System for Smart Office Environment","authors":"W. Yamazaki, F. Mizoguchi","doi":"10.1007/3-540-36532-X_16","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_16","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132215347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Etsuya Shibayama, Shigeki Hagihara, N. Kobayashi, S. Nishizaki, K. Taura, Takuo Watanabe
{"title":"AnZenMail: A Secure and Certified E-mail System","authors":"Etsuya Shibayama, Shigeki Hagihara, N. Kobayashi, S. Nishizaki, K. Taura, Takuo Watanabe","doi":"10.1007/3-540-36532-X_13","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_13","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proof-Carrying Code with Untrusted Proof Rules","authors":"G. Necula, Robert R. Schneck","doi":"10.1007/3-540-36532-X_18","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_18","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active Authentication for Pervasive Computing Environments","authors":"K. Matsumiya, S. Aoki, M. Murase, H. Tokuda","doi":"10.1007/3-540-36532-X_3","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_3","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129695602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}