Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa |
Picking vs. Guessing Secrets: A Game-Theoretic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 243-257, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Edelmira Pasarella, Jorge Lobo 0001 |
Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 232-242, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rémy Chrétien, Véronique Cortier, Stéphanie Delaune |
Decidability of Trace Equivalence for Protocols with Nonces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 170-184, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adam Petcher, Greg Morrisett |
A Mechanized Proof of Security for Searchable Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 481-494, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson |
Set-Pi: Set Membership p-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 185-198, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hoa Ngo, Jong Kim 0001 |
Location Privacy via Differential Private Perturbation of Cloaking Area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 63-74, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina |
Symbolic Malleable Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 412-426, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christian Müller 0008, Máté Kovács, Helmut Seidl |
An Analysis of Universal Information Flow Based on Self-Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 380-393, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joshua D. Guttman, Paul D. Rowe |
A Cut Principle for Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 107-121, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor |
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015, pp. 397-411, 2015, IEEE Computer Society, 978-1-4673-7538-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Chudnov, George Kuan, David A. Naumann |
Information Flow Monitoring as Abstract Interpretation for Relational Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 48-62, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Moses D. Liskov, F. Javier Thayer |
Modeling Diffie-Hellman Derivability for Automated Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 232-243, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alex J. Malozemoff, Jonathan Katz, Matthew D. Green |
Automated Analysis and Synthesis of Block-Cipher Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 140-152, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chris Culnane, Steve A. Schneider |
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 169-183, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub |
Proving Differential Privacy in Hoare Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 411-424, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta |
Provably Sound Browser-Based Enforcement of Web Session Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 366-380, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joshua A. Kroll, Gordon Stewart 0001, Andrew W. Appel |
Portable Software Fault Isolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 18-32, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Georgios Katsoris |
A Sound Abstraction of the Parsing Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 259-273, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Dougherty, Joshua D. Guttman |
Decidability for Lightweight Diffie-Hellman Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 217-231, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Johnson 0001, Aron Laszka, Jens Grossklags |
The Complexity of Estimating Systematic Risk in Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 325-336, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Grossklags, David Reitter |
How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 111-122, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen |
From Input Private to Universally Composable Secure Multi-party Computation Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 184-198, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jia Liu 0003, Mark Dermot Ryan, Liqun Chen 0002 |
Balancing Societal Security and Individual Privacy: Accountable Escrow System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 427-440, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith 0001 |
Additive and Multiplicative Notions of Leakage, and Their Capacities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 308-322, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub |
Certified Synthesis of Efficient Batch Verifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 153-165, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-1-4799-4290-9 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio |
Mignis: A Semantic Based Tool for Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 351-365, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Vigo, Flemming Nielson, Hanne Riis Nielson |
Automated Generation of Attack Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 337-350, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, Cas Cremers, Marko Horvat 0002 |
Actor Key Compromise: Consequences and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 244-258, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Buiras, Deian Stefan, Alejandro Russo |
On Dynamic Flow-Sensitive Floating-Label Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 65-79, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk |
Stateful Declassification Policies for Event-Driven Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 293-307, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Alexandre Pinto |
Attribute-Based Encryption for Access Control Using Elementary Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 125-139, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Heiko Mantel, Matthias Perner, Jens Sauer |
Noninterference under Weak Memory Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 80-94, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth 0001 |
Differential Privacy: An Economic Method for Choosing Epsilon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 398-410, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Willard Rafnsson, Andrei Sabelfeld |
Compositional Information-Flow Security for Interactive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 277-292, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Radha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely, Charles Winebrinner |
Certificates for Verifiable Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 33-47, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 199-213, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Praveen Manoharan 0001, Esfandiar Mohammadi |
TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 383-397, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marian Harbach, Sascha Fahl, Matthew Smith 0001 |
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 97-110, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong |
Declarative Policies for Capability Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 3-17, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Lester 0001, Luke Ong, Max Schäfer |
Information Flow Analysis for a Dynamically Typed Language with Staged Metaprogramming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 209-223, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang 0001 |
A Trust Framework for Evaluating GNSS Signal Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 179-192, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Willard Rafnsson, Andrei Sabelfeld |
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 33-48, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Adão, Riccardo Focardi, Flaminia L. Luccio |
Type-Based Analysis of Generic Key Management APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 97-111, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin |
Verified Computational Differential Privacy with Applications to Smart Metering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 287-301, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Florian Böhl, Dominique Unruh |
Symbolic Universal Composability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 257-271, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Maffei, Kim Pecina, Manuel Reinert |
Security and Privacy by Declarative Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 81-96, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mingsheng Ying, Yuan Feng 0001, Nengkun Yu |
Quantum Information-Flow Security: Noninterference and Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 130-144, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luminous Fennell, Peter Thiemann 0001 |
Gradual Security Typing with References. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 224-239, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco, Lenore D. Zuck |
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 145-160, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dante Zanarini, Mauro Jaskelioff, Alejandro Russo |
Precise Enforcement of Confidentiality for Reactive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 18-32, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-0-7695-5031-2 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Jérémy Planul, John C. Mitchell |
Oblivious Program Execution and Path-Sensitive Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 66-80, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Montagu, Benjamin C. Pierce, Randy Pollack |
A Theory of Information-Flow Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 3-17, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tom Chothia, Yusuke Kawamoto 0001, Chris Novakovic, David Parker 0001 |
Probabilistic Point-to-Point Information Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 193-205, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fabienne Eigner, Matteo Maffei |
Differential Privacy by Typing in Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 272-286, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Aniket Kate, Praveen Manoharan 0001, Sebastian Meiser 0001, Esfandiar Mohammadi |
AnoA: A Framework for Analyzing Anonymous Communication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 163-178, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Besson, Nataliia Bielova, Thomas P. Jensen |
Hybrid Information Flow Monitoring against Web Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 240-254, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chang Liu 0021, Michael Hicks 0001, Elaine Shi |
Memory Trace Oblivious Program Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 51-65, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi |
Cryptographically Enforced RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 115-129, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Küsters, Tomasz Truderung, Juergen Graf |
A Framework for the Cryptographic Verification of Java-Like Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 198-212, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis |
Discovering Concrete Attacks on Website Authorization by Formal Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 247-262, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | John C. Mitchell, Rahul Sharma 0001, Deian Stefan, Joe Zimmerman |
Information-Flow Control for Programming on Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 45-60, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Valerio Genovese, Deepak Garg 0001, Daniele Rispoli |
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 139-153, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Blanchet |
Automatically Verified Mechanized Proof of One-Encryption Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 325-339, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech |
Generic Indifferentiability Proofs of Hash Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 340-353, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi |
Provably Secure and Practical Onion Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 369-385, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Myrto Arapinis, Vincent Cheval, Stéphanie Delaune |
Verifying Privacy-Type Properties in a Modular Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 95-109, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pieter Agten, Raoul Strackx, Bart Jacobs 0002, Frank Piessens |
Secure Compilation to Modern Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 171-185, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alisa Pankova, Peeter Laud |
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 63-77, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pasquale Malacaria, Fabrizio Smeraldi |
The Thermodynamics of Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 280-290, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hedin, Andrei Sabelfeld |
Information-Flow Security for a Core of JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 3-18, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina |
Gran: Model Checking Grsecurity RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 126-138, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Geoffrey Smith 0001 |
Measuring Information Leakage Using Generalized Gain Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 265-279, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Sprenger 0001, David A. Basin |
Refining Key Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 230-246, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Vaughan, Todd D. Millstein |
Secure Information Flow for Concurrent Programs under Total Store Order. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 19-29, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Musard Balliu, Mads Dam, Gurvan Le Guernic |
ENCoVer: Symbolic Exploration for Information Flow Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 30-44, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna 0001 |
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 186-197, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aslan Askarov, Stephen Chong |
Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 308-322, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato |
Security Analysis of Role-Based Access Control through Program Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 113-125, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Chong (eds.) |
25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-1-4673-1918-8 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Zhengqin Luo, Tamara Rezk |
Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 157-170, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benedikt Schmidt 0002, Simon Meier, Cas Cremers, David A. Basin |
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 78-94, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin |
Verified Security of Merkle-Damgård. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 354-368, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Kordy, Sasa Radomirovic |
Constructing Optimistic Multi-party Contract Signing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 215-229, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld |
Securing Interactive Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, pp. 293-307, 2012, IEEE Computer Society, 978-1-4673-1918-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker 0001, Benjamin G. Zorn |
Modular Protections against Non-control Data Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 131-145, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
non-control data attack, control-flow integrity, frame rule, data isolation, data integrity, Hoare logic, language-based security |
1 | Gilles Barthe, Boris Köpf |
Information-Theoretic Bounds for Differentially Private Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 191-204, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Quantitative Information-Flow, Information Theory, Differential Privacy |
1 | Tom Chothia, Apratim Guha |
A Statistical Test for Information Leaks Using Continuous Mutual Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 177-190, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Continuous Mutual Information, Information Theory, Statistics, Information leakage, e-Passport |
1 | Heiko Mantel, David Sands 0001, Henning Sudbrock |
Assumptions and Guarantees for Compositional Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 218-232, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Assumption-Guarantee, Compositional Verification, Flow-Sensitivity, Information Flow Security |
1 | |
Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![IEEE Computer Society, 978-1-61284-644-6 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel |
Formal Analysis of Protocols Based on TPM State Registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 66-80, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
formal verification, TPM |
1 | Myrto Arapinis, Eike Ritter, Mark Dermot Ryan |
StatVerif: Verification of Stateful Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 33-47, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | François Dupressoir, Andrew D. Gordon 0001, Jan Jürjens, David A. Naumann |
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 3-17, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | James Cheney |
A Formal Framework for Provenance Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 281-293, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
security, semantics, provenance |
1 | Pavol Cerný, Krishnendu Chatterjee, Thomas A. Henzinger |
The Complexity of Quantitative Information Flow Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 205-217, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
quantitative information flow, computational complexity, verification, synthesis |
1 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 99-113, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Access control, workflow, Separation of Duty, authorization constraint |
1 | Piotr Mardziel, Stephen Magill, Michael Hicks 0001, Mudhakar Srivatsa |
Dynamic Enforcement of Knowledge-Based Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 114-128, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
probabilistic polyhedron, knowledge-based security, privacy, abstract interpretation |
1 | Scott Moore, Stephen Chong |
Static Analysis for Efficient Hybrid Information-Flow Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 146-160, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
hybrid information-flow monitors, dynamic information-flow monitors, information-flow control |
1 | Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha |
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 312-327, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Auditing Learning Game Model Regret Minimization Economics |