Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks 0001 |
Achieving Safety Incrementally with Checked C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 76-98, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Massimo Bartoletti, Roberto Zunino |
Verifying Liquidity of Bitcoin Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 222-247, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Flemming Nielson, David Sands 0001 (eds.) |
Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-030-17137-7 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | John D. Ramsdell, Paul D. Rowe, Perry Alexander, Sarah Helble, Peter A. Loscocco, J. Aaron Pendergrass, Adam Petz |
Orchestrating Layered Attestations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 197-221, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Fernandes, Mark Dras, Annabelle McIver |
Generalised Differential Privacy for Text Document Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 123-148, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | David Butler 0002, David Aspinall 0001, Adrià Gascón |
On the Formalisation of Σ-Protocols and Commitment Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 175-196, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Debant, Stéphanie Delaune |
Symbolic Verification of Distance Bounding Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 149-174, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon Oddershede Gregersen, Søren Eller Thomsen, Aslan Askarov |
A Dependently Typed Library for Static Information-Flow Control in Idris. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 51-75, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Marco Vassena, Gary Soeller, Peter Amidon, Matthew Chan, John Renner, Deian Stefan |
Foundations for Parallel Information Flow Control Runtime Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 1-28, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tachio Terauchi, Timos Antonopoulos |
A Formal Analysis of Timing Channel Security via Bucketing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 29-50, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aseem Rastogi, Nikhil Swamy, Michael Hicks 0001 |
Wys*: A DSL for Verified Secure Multi-party Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, pp. 99-122, 2019, Springer, 978-3-030-17137-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino |
SoK: Unraveling Bitcoin Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 217-242, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta |
Transcompiling Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 303-324, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Yusuke Kawamoto 0001, Catuscia Palamidessi |
Leakage and Protocol Composition in a Game-Theoretic Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 134-159, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Kordy, Wojciech Widel |
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 325-346, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Vasilikos, Flemming Nielson, Hanne Riis Nielson |
Secure Information Release in Timed Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 28-52, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Anastasia Mavridou, Aron Laszka |
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 270-277, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ilya Grishchenko, Matteo Maffei, Clara Schneidewind |
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 243-269, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks 0001, Stephen Magill |
What's the Over/Under? Probabilistic Bounds on Information Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 3-27, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov, Lars Birkedal |
Compositional Non-interference for Concurrent Programs via Separation and Framing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 53-78, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer, Ralf Küsters (eds.) |
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-319-89721-9 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò 0001 |
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 188-213, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Azevedo de Amorim, Catalin Hritcu, Benjamin C. Pierce |
The Meaning of Memory Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 79-105, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg 0001 |
UniTraX: Protecting Data Privacy with Discoverable Biases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 278-299, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei |
Equivalence Properties by Typing in Cryptographic Branching Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 160-187, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam |
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, pp. 109-133, 2018, Springer, 978-3-319-89721-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kushal Babel, Vincent Cheval, Steve Kremer |
On Communication Models When Verifying Equivalence Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 141-163, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sergiu Bursuc, Christian Johansen, Shiwei Xu |
Automated Verification of Dynamic Root of Trust Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 95-116, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zaruhi Aslanyan, Flemming Nielson |
Model Checking Exact Cost for Attack Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 210-231, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli |
A Survey of Attacks on Ethereum Smart Contracts (SoK). ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 164-186, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Blot, Masaki Yamamoto 0004, Tachio Terauchi |
Compositional Synthesis of Leakage Resilient Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 277-297, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld |
A Principled Approach to Tracking Information Flow in the Presence of Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 49-70, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Cañones, Boris Köpf, Jan Reineke 0001 |
Security Analysis of Cache Replacement Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 189-209, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Maffei, Mark Ryan 0001 (eds.) |
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-662-54454-9 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Ah-Fat, Michael Huth 0001 |
Secure Multi-party Computation: Information Flow of Outputs and Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 71-92, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse |
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 117-140, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ridha Khédri, Owain Jones, Mohammed Alabbad |
Defense in Depth Formulation and Usage in Dynamic Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 253-274, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Willard Rafnsson, Limin Jia 0001, Lujo Bauer |
Timing-Sensitive Noninterference through Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 3-25, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Cramer, Giovanni Casini |
Postulates for Revocation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 232-252, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Pettai, Peeter Laud |
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 298-319, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Piotr Mardziel, Michael W. Hicks |
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, pp. 26-48, 2017, Springer, 978-3-662-54454-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Schmitz 0001, Dustin Rhodes, Thomas H. Austin, Kenneth L. Knowles, Cormac Flanagan |
Faceted Dynamic Information Flow via Control and Data Monads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 3-23, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Falzon, Eric Bodden |
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 116-138, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Holger Hermanns, Julia Krämer, Jan Krcál, Mariëlle Stoelinga |
The Value of Attack-Defence Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 163-185, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nataliia Bielova, Tamara Rezk |
A Taxonomy of Information Flow Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 46-67, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Computational Soundness Results for Stateful Applied π Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 254-275, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Iulia Bolosteanu, Deepak Garg 0001 |
Asymmetric Secure Multi-execution with Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 24-45, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Breitner, Jürgen Graf 0001, Martin Hecker 0001, Martin Mohr, Gregor Snelting |
On Improvements of Low-Deterministic Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 68-88, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Quoc Huy Do 0002, Eduard Kamburjan, Nathan Wasser |
Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 97-115, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka |
Correct Audit Logging: Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 139-162, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jürgen Graf 0001, Martin Hecker 0001, Martin Mohr, Gregor Snelting |
Tool Demonstration: JOANA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 89-93, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Alessandro Bruni |
AIF-ω: Set-Based Protocol Abstraction with Countable Families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 233-253, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Antoine Dallon, Stéphanie Delaune |
Bounding the Number of Agents, for Equivalence Too. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 211-232, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan 0001 |
Composing Protocols with Randomized Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 189-210, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Frank Piessens, Luca Viganò 0001 (eds.) |
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-662-49634-3 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Fabian Bendun, Jörg Hoffmann 0001, Ninja Marnau |
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 344-363, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tom Chothia, Ben Smyth, Christopher Staite |
Automatically Checking Commitment Protocols in ProVerif without False Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 137-155, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling |
Type-Based Verification of Electronic Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 303-323, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sibylle B. Fröschle |
Leakiness is Decidable for Well-Founded Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 176-195, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Catuscia Palamidessi |
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 3-7, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sjouke Mauw, Sasa Radomirovic |
Generalizing Multi-party Contract Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 156-175, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone |
Analysis of XACML Policies with SMT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 115-134, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Binh Nguyen 0003, Christoph Sprenger 0001 |
Abstractions for Security Protocol Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 196-215, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Andrew C. Myers (eds.) |
Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-662-46665-0 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bart van Delft, Sebastian Hunt, David Sands 0001 |
Very Static Enforcement of Dynamic Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 32-52, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 259-279, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo |
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 11-31, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beilke, Volker Roth 0002 |
A Safe Update Mechanism for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 239-258, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adam Petcher, Greg Morrisett |
The Foundational Cryptography Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 53-72, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Myrto Arapinis, Vincent Cheval, Stéphanie Delaune |
Composing Security Protocols: From Confidentiality to Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 324-343, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zaruhi Aslanyan, Flemming Nielson |
Pareto Efficient Solutions of Attack-Defence Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 95-114, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Cheval, Véronique Cortier |
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 280-299, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Robert Künnemann |
Automated Backward Analysis of PKCS#11 v2.20. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 219-238, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Michael Isard |
On the Flow of Data, Information, and Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 73-92, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Esfandiar Mohammadi, Tim Ruffing |
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 42-62, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Baelde, Stéphanie Delaune, Lucca Hirschi |
A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 1-21, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Andre Scedrov, Fred B. Schneider |
When Not All Bits Are Equal: Worth-Based Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 120-139, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marion Daubignard, David Lubicz, Graham Steel |
A Secure Key Management Interface with Asymmetric Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 63-82, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf |
Extending and Applying a Framework for the Cryptographic Verification of Java Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 220-239, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Arnold, Holger Hermanns, Reza Pulungan, Mariëlle Stoelinga |
Time-Dependent Analysis of Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 285-305, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rohit Chadha, Dileep Kini, Mahesh Viswanathan 0001 |
Quantitative Information Flow in Boolean Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 103-119, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Annabelle McIver, Carroll Morgan, Geoffrey Smith 0001, Barbara Espinoza, Larissa Meinicke |
Abstract Channels and Their Robust Information-Leakage Ordering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 83-102, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Bichhawat, Vineet Rajani, Deepak Garg 0001, Christian Hammer 0001 |
Information Flow Control in WebKit's JavaScript Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 159-178, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Barbosa, David Castro 0003, Paulo F. Silva 0001 |
Compiling CAO: From Cryptographic Specifications to C Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 240-244, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin |
Decentralized Composite Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 245-264, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Steve Kremer (eds.) |
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-642-54791-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Myrto Arapinis, Jia Liu 0003, Eike Ritter, Mark Ryan 0001 |
Stateful Applied Pi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 22-41, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa |
Leakage Resilience against Concurrent Cache Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 140-158, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Costanzo, Zhong Shao |
A Separation Logic for Enforcing Declarative Information Flow Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 179-198, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jed Liu, Andrew C. Myers |
Defining and Enforcing Referential Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 199-219, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez 0001 |
Temporal Logics for Hyperproperties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings, pp. 265-284, 2014, Springer, 978-3-642-54791-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson |
Lazy Mobile Intruders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 147-166, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Carbone, Joshua D. Guttman |
Sessions and Separability in Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 267-286, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino |
A Theory of Agreements and Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 186-205, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rémy Chrétien, Stéphanie Delaune |
Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 1-20, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Binh Nguyen 0003, Christoph Sprenger 0001 |
Sound Security Protocol Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 83-104, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech |
Formal Verification of e-Auction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 247-266, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Cadé, Bruno Blanchet |
Proved Generation of Implementations from Computationally Secure Protocol Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 63-82, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, John C. Mitchell (eds.) |
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![Springer, 978-3-642-36829-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ehab ElSalamouny, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi |
A Differentially Private Mechanism of Optimal Utility for a Region of Priors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pp. 41-62, 2013, Springer, 978-3-642-36829-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|