The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSF"( http://dblp.L3S.de/Venues/CSF )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
2007 (27) 2008 (23) 2009 (23) 2010 (24) 2011 (22) 2012 (26) 2013 (20) 2014 (30) 2015 (36) 2016 (35) 2017 (35) 2018 (28) 2019 (31) 2020 (29) 2021 (44) 2022 (33) 2023 (39)
Publication types (Num. hits)
inproceedings(488) proceedings(17)
Venues (Conferences, Journals, ...)
CSF(505)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 191 occurrences of 127 keywords

Results
Found 505 publication records. Showing 505 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa Picking vs. Guessing Secrets: A Game-Theoretic Analysis. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Edelmira Pasarella, Jorge Lobo 0001 Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rémy Chrétien, Véronique Cortier, Stéphanie Delaune Decidability of Trace Equivalence for Protocols with Nonces. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adam Petcher, Greg Morrisett A Mechanized Proof of Security for Searchable Symmetric Encryption. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson Set-Pi: Set Membership p-Calculus. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hoa Ngo, Jong Kim 0001 Location Privacy via Differential Private Perturbation of Cloaking Area. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina Symbolic Malleable Zero-Knowledge Proofs. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian Müller 0008, Máté Kovács, Helmut Seidl An Analysis of Universal Information Flow Based on Self-Composition. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Paul D. Rowe A Cut Principle for Information Flow. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrey Chudnov, George Kuan, David A. Naumann Information Flow Monitoring as Abstract Interpretation for Relational Logic. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Moses D. Liskov, F. Javier Thayer Modeling Diffie-Hellman Derivability for Automated Analysis. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alex J. Malozemoff, Jonathan Katz, Matthew D. Green Automated Analysis and Synthesis of Block-Cipher Modes of Operation. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chris Culnane, Steve A. Schneider A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub Proving Differential Privacy in Hoare Logic. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta Provably Sound Browser-Based Enforcement of Web Session Integrity. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joshua A. Kroll, Gordon Stewart 0001, Andrew W. Appel Portable Software Fault Isolation. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim, Georgios Katsoris A Sound Abstraction of the Parsing Problem. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel J. Dougherty, Joshua D. Guttman Decidability for Lightweight Diffie-Hellman Protocols. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benjamin Johnson 0001, Aron Laszka, Jens Grossklags The Complexity of Estimating Systematic Risk in Networks. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jens Grossklags, David Reitter How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen From Input Private to Universally Composable Secure Multi-party Computation Primitives. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jia Liu 0003, Mark Dermot Ryan, Liqun Chen 0002 Balancing Societal Security and Individual Privacy: Accountable Escrow System. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith 0001 Additive and Multiplicative Notions of Leakage, and Their Capacities. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub Certified Synthesis of Efficient Batch Verifiers. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014 Search on Bibsonomy CSF The full citation details ... 2014 DBLP  BibTeX  RDF
1Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio Mignis: A Semantic Based Tool for Firewall Configuration. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Roberto Vigo, Flemming Nielson, Hanne Riis Nielson Automated Generation of Attack Trees. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David A. Basin, Cas Cremers, Marko Horvat 0002 Actor Key Compromise: Consequences and Countermeasures. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pablo Buiras, Deian Stefan, Alejandro Russo On Dynamic Flow-Sensitive Floating-Label Systems. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk Stateful Declassification Policies for Event-Driven Programs. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Alexandre Pinto Attribute-Based Encryption for Access Control Using Elementary Operations. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Heiko Mantel, Matthias Perner, Jens Sauer Noninterference under Weak Memory Models. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth 0001 Differential Privacy: An Economic Method for Choosing Epsilon. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Andrei Sabelfeld Compositional Information-Flow Security for Interactive Systems. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Radha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely, Charles Winebrinner Certificates for Verifiable Forensics. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Praveen Manoharan 0001, Esfandiar Mohammadi TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marian Harbach, Sascha Fahl, Matthew Smith 0001 Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong Declarative Policies for Capability Control. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Lester 0001, Luke Ong, Max Schäfer Information Flow Analysis for a Dynamically Typed Language with Staged Metaprogramming. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang 0001 A Trust Framework for Evaluating GNSS Signal Integrity. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Andrei Sabelfeld Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pedro Adão, Riccardo Focardi, Flaminia L. Luccio Type-Based Analysis of Generic Key Management APIs. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin Verified Computational Differential Privacy with Applications to Smart Metering. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Böhl, Dominique Unruh Symbolic Universal Composability. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matteo Maffei, Kim Pecina, Manuel Reinert Security and Privacy by Declarative Design. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mingsheng Ying, Yuan Feng 0001, Nengkun Yu Quantum Information-Flow Security: Noninterference and Access Control. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luminous Fennell, Peter Thiemann 0001 Gradual Security Typing with References. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco, Lenore D. Zuck Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dante Zanarini, Mauro Jaskelioff, Alejandro Russo Precise Enforcement of Confidentiality for Reactive Systems. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013 Search on Bibsonomy CSF The full citation details ... 2013 DBLP  BibTeX  RDF
1Jérémy Planul, John C. Mitchell Oblivious Program Execution and Path-Sensitive Non-interference. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benoît Montagu, Benjamin C. Pierce, Randy Pollack A Theory of Information-Flow Labels. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tom Chothia, Yusuke Kawamoto 0001, Chris Novakovic, David Parker 0001 Probabilistic Point-to-Point Information Leakage. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabienne Eigner, Matteo Maffei Differential Privacy by Typing in Security Protocols. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Aniket Kate, Praveen Manoharan 0001, Sebastian Meiser 0001, Esfandiar Mohammadi AnoA: A Framework for Analyzing Anonymous Communication Protocols. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Frédéric Besson, Nataliia Bielova, Thomas P. Jensen Hybrid Information Flow Monitoring against Web Tracking. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chang Liu 0021, Michael Hicks 0001, Elaine Shi Memory Trace Oblivious Program Execution. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi Cryptographically Enforced RBAC. Search on Bibsonomy CSF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ralf Küsters, Tomasz Truderung, Juergen Graf A Framework for the Cryptographic Verification of Java-Like Programs. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis Discovering Concrete Attacks on Website Authorization by Formal Analysis. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1John C. Mitchell, Rahul Sharma 0001, Deian Stefan, Joe Zimmerman Information-Flow Control for Programming on Encrypted Data. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Valerio Genovese, Deepak Garg 0001, Daniele Rispoli Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet Automatically Verified Mechanized Proof of One-Encryption Key Exchange. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech Generic Indifferentiability Proofs of Hash Designs. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi Provably Secure and Practical Onion Routing. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Myrto Arapinis, Vincent Cheval, Stéphanie Delaune Verifying Privacy-Type Properties in a Modular Way. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pieter Agten, Raoul Strackx, Bart Jacobs 0002, Frank Piessens Secure Compilation to Modern Processors. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alisa Pankova, Peeter Laud Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pasquale Malacaria, Fabrizio Smeraldi The Thermodynamics of Confidentiality. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel Hedin, Andrei Sabelfeld Information-Flow Security for a Core of JavaScript. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina Gran: Model Checking Grsecurity RBAC Policies. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Geoffrey Smith 0001 Measuring Information Leakage Using Generalized Gain Functions. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christoph Sprenger 0001, David A. Basin Refining Key Establishment. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jeffrey A. Vaughan, Todd D. Millstein Secure Information Flow for Concurrent Programs under Total Store Order. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Musard Balliu, Mads Dam, Gurvan Le Guernic ENCoVer: Symbolic Exploration for Information Flow Security. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna 0001 Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Stephen Chong Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato Security Analysis of Role-Based Access Control through Program Verification. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stephen Chong (eds.) 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012 Search on Bibsonomy CSF The full citation details ... 2012 DBLP  BibTeX  RDF
1Zhengqin Luo, Tamara Rezk Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benedikt Schmidt 0002, Simon Meier, Cas Cremers, David A. Basin Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin Verified Security of Merkle-Damgård. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Barbara Kordy, Sasa Radomirovic Constructing Optimistic Multi-party Contract Signing Protocols. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld Securing Interactive Programs. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker 0001, Benjamin G. Zorn Modular Protections against Non-control Data Attacks. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF non-control data attack, control-flow integrity, frame rule, data isolation, data integrity, Hoare logic, language-based security
1Gilles Barthe, Boris Köpf Information-Theoretic Bounds for Differentially Private Mechanisms. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Quantitative Information-Flow, Information Theory, Differential Privacy
1Tom Chothia, Apratim Guha A Statistical Test for Information Leaks Using Continuous Mutual Information. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Continuous Mutual Information, Information Theory, Statistics, Information leakage, e-Passport
1Heiko Mantel, David Sands 0001, Henning Sudbrock Assumptions and Guarantees for Compositional Noninterference. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Assumption-Guarantee, Compositional Verification, Flow-Sensitivity, Information Flow Security
1 Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011 Search on Bibsonomy CSF The full citation details ... 2011 DBLP  BibTeX  RDF
1Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel Formal Analysis of Protocols Based on TPM State Registers. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF formal verification, TPM
1Myrto Arapinis, Eike Ritter, Mark Dermot Ryan StatVerif: Verification of Stateful Processes. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1François Dupressoir, Andrew D. Gordon 0001, Jan Jürjens, David A. Naumann Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1James Cheney A Formal Framework for Provenance Security. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security, semantics, provenance
1Pavol Cerný, Krishnendu Chatterjee, Thomas A. Henzinger The Complexity of Quantitative Information Flow Problems. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF quantitative information flow, computational complexity, verification, synthesis
1David A. Basin, Samuel J. Burri, Günter Karjoth Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Access control, workflow, Separation of Duty, authorization constraint
1Piotr Mardziel, Stephen Magill, Michael Hicks 0001, Mudhakar Srivatsa Dynamic Enforcement of Knowledge-Based Security Policies. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF probabilistic polyhedron, knowledge-based security, privacy, abstract interpretation
1Scott Moore, Stephen Chong Static Analysis for Efficient Hybrid Information-Flow Control. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF hybrid information-flow monitors, dynamic information-flow monitors, information-flow control
1Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Auditing Learning Game Model Regret Minimization Economics
Displaying result #301 - #400 of 505 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license