Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David A. Basin, Sasa Radomirovic, Lara Schmid |
Alethea: A Provably Secure Random Sample Voting Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018, pp. 283-297, 2018, IEEE Computer Society, 978-1-5386-6680-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hongxu Chen 0001, Alwen Tiu, Zhiwu Xu 0001, Yang Liu 0003 |
A Permission-Dependent Type System for Secure Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018, pp. 218-232, 2018, IEEE Computer Society, 978-1-5386-6680-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Sogol Mazaheri |
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018, pp. 76-90, 2018, IEEE Computer Society, 978-1-5386-6680-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vineet Rajani, Deepak Garg 0001 |
Types for Information Flow Control: Labeling Granularity and Semantic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018, pp. 233-246, 2018, IEEE Computer Society, 978-1-5386-6680-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Marco Squarcina |
Run-Time Attack Detection in Cryptographic APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 176-188, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marco Guarnieri, Srdjan Marinovic, David A. Basin |
Securing Databases from Probabilistic Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 343-359, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hubert Comon, Adrien Koutsos |
Formal Computational Unlinkability Proofs of RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 100-114, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Blanchet |
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 68-82, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stéphanie Delaune, Steve Kremer, Ludovic Robin |
Formal Verification of Protocols Based on Short Authenticated Strings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 130-143, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin |
UC-Secure Non-interactive Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 217-233, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | M. H. R. Khouzani, Pasquale Malacaria |
Leakage-Minimal Design: Universality, Limitations, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 305-317, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò 0001 |
A Formal Approach to Cyber-Physical Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 436-450, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei |
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 22-36, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marco Vassena, Joachim Breitner, Alejandro Russo |
Securing Concurrent Lazy Programs Against Information Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 37-52, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Cheval, Véronique Cortier, Bogdan Warinschi |
Secure Composition of PKIs with Public Key Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 144-158, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Elaine Shi |
Rethinking Large-Scale Consensus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 115-129, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marco Patrignani, Deepak Garg 0001 |
Secure Compilation and Hyperproperty Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 392-404, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang 0001 |
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 1-6, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Li Zhou, Mingsheng Ying |
Differential Privacy in Quantum Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 249-262, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Viktor Hess, Sebastian Mödersheim |
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 451-463, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval |
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 159-175, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-1-5386-3217-8 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Michael Backes 0001, Manuel Gomez-Rodriguez, Praveen Manoharan 0001, Bartlomiej Surma |
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 292-304, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Gazeau, Tom Chothia, Dominic Duggan |
Types for Location and Data Security in Cloud Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 376-391, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ilya Mironov |
Rényi Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 263-275, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hyoukjun Kwon, William Harris, Hadi Esmaeilzadeh |
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 420-435, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alley Stoughton, Mayank Varia |
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 83-99, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peixuan Li, Danfeng Zhang |
Towards a Flow- and Path-Sensitive Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 53-67, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Fett, Ralf Küsters, Guido Schmitz |
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 189-202, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer |
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 234-248, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu |
Verified Translation Validation of Static Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 405-419, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan |
Synthesis of Adaptive Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 328-342, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia |
A Universally Composable Treatment of Network Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 360-375, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan 0001 |
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 203-216, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang 0001, Christopher Kruegel, Giovanni Vigna, David Brumley |
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 7-21, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Per A. Hallgren, Claudio Orlandi, Andrei Sabelfeld |
PrivatePool: Privacy-Preserving Ridesharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 276-291, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | David M. Smith, Geoffrey Smith 0001 |
Tight Bounds on Information Leakage from Repeated Independent Runs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 318-327, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Emanuele D'Osualdo, Luke Ong, Alwen Tiu |
Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 464-480, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Antoine Dallon, Stéphanie Delaune |
SAT-Equiv: An Efficient Tool for Equivalence Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 481-494, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio |
Localizing Firewall Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 194-209, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marco Patrignani, Dominique Devriese, Frank Piessens |
On Modular and Fully-Abstract Compilation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 17-30, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nicolás E. Bordenabe, Geoffrey Smith 0001 |
Correlated Secrets in Quantitative Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 93-104, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi |
Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 458-470, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrew W. Appel |
Modular Verification for Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 1-8, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Küsters, Johannes Müller 0001, Enrico Scapin, Tomasz Truderung |
sElect: A Lightweight Verifiable Remote Voting System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 341-354, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan |
A Verified Extensible Library of Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 296-309, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Úlfar Erlingsson |
Data-Driven Software Security: Models and Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 9-15, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Corina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria |
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 387-400, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | M. H. R. Khouzani, Pasquale Malacaria |
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 61-76, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Søren Debois, Thomas T. Hildebrandt |
In the Nick of Time: Proactive Prevention of Obligation Violations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 120-134, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xi Wu 0001, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton |
A Methodology for Formalizing Model-Inversion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 355-370, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce |
Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 45-60, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Cédric Fournet, Chantal Keller, Vincent Laporte |
A Certified Compiler for Verifiable Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 268-280, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Filippo Del Tedesco, David Sands 0001, Alejandro Russo |
Fault-Resilient Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 401-416, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith 0001 |
Axioms for Information Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 77-92, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zaruhi Aslanyan, Flemming Nielson, David Parker 0001 |
Quantitative Verification and Synthesis of Attack-Defence Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 105-119, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker |
Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 432-442, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson |
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 16, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Blanchet, Ben Smyth |
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 310-324, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jeremiah Blocki, Anupam Datta |
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 371-386, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Simon Greiner, Daniel Grahl |
Non-interference with What-Declassification in Component-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 253-267, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Besson, Nataliia Bielova, Thomas P. Jensen |
Hybrid Monitoring of Attacker Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 225-238, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Scerri, Ryan Stanley-Oakes |
Analysis of Key Wrapping APIs: Generic Policies, Computational Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 281-295, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Petar Tsankov, Mohammad Torabi Dashti, David A. Basin |
Access Control Synthesis for Physical Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 443-457, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shreya Agrawal, Borzoo Bonakdarpour |
Runtime Verification of k-Safety Hyperproperties in HyperLTL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 239-252, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mounir Assaf, David A. Naumann |
Calculational Design of Information Flow Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 210-224, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Sasa Radomirovic, Lara Schmid |
Modeling Human Errors in Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 325-340, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Katriel Cohn-Gordon, Cas Cremers, Luke Garratt |
On Post-compromise Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 164-178, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Owen Arden, Andrew C. Myers |
A Calculus for Flow-Limited Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 135-149, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sergiu Costea, Bogdan Warinschi |
Secure Software Licensing: Models, Constructions, and Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 31-44, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei |
Micro-policies for Web Session Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 179-193, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Toby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah |
Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 417-431, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-1-5090-2607-4 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
1 | Vineet Rajani, Deepak Garg 0001, Tamara Rezk |
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 150-163, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Owen Arden, Jed Liu, Andrew C. Myers |
Flow-Limited Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 569-583, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr |
A Hybrid Approach for Proving Noninterference of Java Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 305-319, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong |
Cryptographic Enforcement of Language-Based Information Erasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 334-348, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Niklas Broberg, Bart van Delft, David Sands 0001 |
The Anatomy and Facets of Dynamic Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 122-136, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vineet Rajani, Abhishek Bichhawat, Deepak Garg 0001, Christian Hammer 0001 |
Information Flow Control for Event Handling and the DOM in Web Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 366-379, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi |
Policy Privacy in Cryptographic Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 46-60, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing |
A Methodology for Information Flow Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 554-568, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
Compositional Typed Analysis of ARBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 33-45, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martin Pettai, Peeter Laud |
Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 75-89, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici |
BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 276-289, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kui Xu 0002, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian |
Probabilistic Program Modeling for High-Precision Anomaly Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 497-511, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hedin, Luciano Bello, Andrei Sabelfeld |
Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 351-365, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Roberto Carbone, Gabriele Costa 0001, Alessio Merlo |
Android Permissions Unleashed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 320-333, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David Nuñez 0001, Isaac Agudo, Javier López 0001 |
A Parametric Family of Attack Models for Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 290-301, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christian Matt 0002, Ueli Maurer |
A Definitional Framework for Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 217-231, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | William C. Garrison III, Adam J. Lee |
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 18-32, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel |
Analyzing First-Order Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 3-17, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Schoepe, Andrei Sabelfeld |
Understanding and Enforcing Opacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 539-553, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen 0002, Michael R. Clarkson |
Du-Vote: Remote Electronic Voting with Untrusted Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 155-169, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aslan Askarov, Stephen Chong, Heiko Mantel |
Hybrid Monitors for Concurrent Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 137-151, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Datta, Deepak Garg 0001, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha |
Program Actions as Actual Causes: A Building Block for Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 261-275, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Limin Jia 0001, Shayak Sen, Deepak Garg 0001, Anupam Datta |
A Logic of Programs with Interface-Confined Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 512-525, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Goran Doychev, Boris Köpf |
Rational Protection against Timing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 526-536, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cédric Fournet, Michael W. Hicks, Luca Viganò 0001 (eds.) |
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-1-4673-7538-2 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | David A. Basin, Sasa Radomirovic, Michael Schläpfer |
A Complete Characterization of Secure Human-Server Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 199-213, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michela Chessa, Jens Grossklags, Patrick Loiseau |
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 90-104, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|