default search action
23rd CSF 2010: Edinburgh, United Kingdom
- Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4082-5
- Boris Köpf, Andrey Rybalchenko:
Approximation and Randomization for Quantitative Information-Flow Analysis. 3-14 - Hirotoshi Yasuoka, Tachio Terauchi:
Quantitative Information Flow - Verification Hardness and Possibilities. 15-27 - Michael R. Clarkson, Fred B. Schneider:
Quantification of Integrity. 28-43 - Boris Köpf, Geoffrey Smith:
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. 44-56 - Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune:
Modeling and Verifying Ad Hoc Routing Protocols. 59-74 - Mayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog:
Formal Verification of Privacy for RFID Systems. 75-88 - Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi:
Robustness Guarantees for Anonymity. 91-106 - Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan:
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. 107-121 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:
A Game-Based Definition of Coercion-Resistance and Its Applications. 122-136 - Adam J. Lee, Ting Yu:
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. 139-153 - Lujo Bauer, Limin Jia, Divya Sharma:
Constraining Credential Usage in Logic-Based Access Control. 154-168 - Moritz Y. Becker:
Information Flow in Credential Systems. 171-185 - Alejandro Russo, Andrei Sabelfeld:
Dynamic vs. Static Flow-Sensitive Security Analysis. 186-199 - Andrey Chudnov, David A. Naumann:
Information Flow Monitor Inlining. 200-214 - Stephen Chong:
Required Information Release. 215-227 - Simon Meier, Cas Cremers, David A. Basin:
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. 231-245 - Gilles Barthe, Daniel Hedin, Santiago Zanella Béguelin, Benjamin Grégoire, Sylvain Heraud:
A Machine-Checked Formalization of Sigma-Protocols. 246-260 - Benedikt Schmidt, Patrick Schaller, David A. Basin:
Impossibility Results for Secret Establishment. 261-273 - Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
A Framework for the Sound Specification of Cryptographic Tasks. 277-289 - Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell, Dawn Song:
Towards a Formal Foundation of Web Security. 290-304 - Alwen Tiu, Jeremy E. Dawson:
Automating Open Bisimulation Checking for the Spi Calculus. 307-321 - Stefan Ciobaca, Véronique Cortier:
Protocol Composition for Arbitrary Primitives. 322-336 - Martín Abadi, Gordon D. Plotkin:
On Protection by Layout Randomization. 337-351
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.