Protection of Keys against Modification Attack.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Least Privilege Security in CapBasED-AMS.
Int. J. Cooperative Inf. Syst., 1999
On <i>m</i>-Permutation Protection Scheme Against Modification Attack.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications.
J. Comput. Secur., 1998
A Logical Approach to Multilevel Security of Probabilistic Systems.
Distributed Comput., 1998
A Study of Least Privilege in CapBasED-AMS.
Proceedings of the 3rd IFCIS International Conference on Cooperative Information Systems, 1998
Protection Against EEPROM Modification Attacks.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
On the Clark-Jacob Version of SPLICE/AS.
Inf. Process. Lett., 1997
Protocols for issuing public-key certificates over the Internet.
Proceedings of the Information and Communication Security, First International Conference, 1997
The epistemic representation of information flow security in probabilistic systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
Using temporal logic to specify and verify cryptographic protocols.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
On introducing noise into the bus-contention channel.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
On Analyzing the Bus-Contention Channel Under Fuzzy Time.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
Toward a Mathematical Foundation for Information.
J. Comput. Secur., 1992
Toward a Mathematical Foundation for Information Flow Security.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
On Information Flow Security Models.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Probabilistic Interference.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Information Sharing in Secure Systems.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990