CSF A

23 papers

YearTitle / Authors
2009A Method for Proving Observational Equivalence.
Véronique Cortier, Stéphanie Delaune
2009A Provably Secure and Efficient Countermeasure against Timing Attacks.
Boris Köpf, Markus Dürmuth
2009A Secure Cryptographic Token Interface.
Christian Cachin, Nishanth Chandran
2009ASPIER: An Automated Framework for Verifying Security Protocol Implementations.
Sagar Chaki, Anupam Datta
2009Achieving Security Despite Compromise Using Zero-knowledge.
Michael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei
2009Advice from Belnap Policies.
Chris Hankin, Flemming Nielson, Hanne Riis Nielson
2009Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code.
Phillip Rogaway, Till Stegers
2009Cryptographic Protocol Synthesis and Verification for Multiparty Sessions.
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, James J. Leifer
2009Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists.
Najah Chridi, Mathieu Turuani, Michaël Rusinowitch
2009Expressive Power of Definite Clauses for Verifying Authenticity.
Gilberto Filé, Roberto Vigo
2009Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities.
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov
2009Language-Based Isolation of Untrusted JavaScript.
Sergio Maffeis, Ankur Taly
2009Minimal Message Complexity of Asynchronous Multi-party Contract Signing.
Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Dashti
2009Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
Patrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun
2009More Anonymous Onion Routing Through Trust.
Aaron Johnson, Paul F. Syverson
2009Policy Compliance in Collaborative Systems.
Max I. Kanovich, Paul D. Rowe, Andre Scedrov
2009Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009
2009Securing Timeout Instructions in Web Applications.
Alejandro Russo, Andrei Sabelfeld
2009Specification and Analysis of Dynamic Authorisation Policies.
Moritz Y. Becker
2009Tight Enforcement of Information-Release Policies for Dynamic Languages.
Aslan Askarov, Andrei Sabelfeld
2009Universally Composable Symmetric Encryption.
Ralf Küsters, Max Tuengerthal
2009Updatable Security Views.
J. Nathan Foster, Benjamin C. Pierce, Steve Zdancewic
2009Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation.
Ralf Küsters, Tomasz Truderung