Up a level |
Bieber, P., & Boulahia Cuppens, N. (1994, January). Formal Development of Authentication Protocols [Paper]. 6th Refinement Workshop, London, UK. External link
Bieber, P., Boulahia Cuppens, N., Lehmann, T., & van Wickeren, E. (1993, June). Abstract Machines for Communication Security [Paper]. 6th Computer Security Foundations Workshop, Franconia, NH, USA. External link
Bieber, P., & Cuppens, F. (1992). A Logical View of Secure Dependencies. Journal of Computer Security,, 1(1), 99-130. External link
Bieber, P., & Cuppens, F. (1992, June). Secure Dependencies with Dynamic Level Assignments [Paper]. Computer Security Foundations Workshop, Franconia, NH, USA. External link
Bieber, P., & Cuppens, F. (1991, June). A Definition of Secure Dependencies Using the Logic of Security [Paper]. 4th Computer Security Foundations Workshop, Franconia, NH, USA. External link