CSF A

24 papers

YearTitle / Authors
2010A Framework for the Sound Specification of Cryptographic Tasks.
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
2010A Game-Based Definition of Coercion-Resistance and Its Applications.
Ralf Küsters, Tomasz Truderung, Andreas Vogt
2010A Machine-Checked Formalization of Sigma-Protocols.
Gilles Barthe, Daniel Hedin, Santiago Zanella-Béguelin, Benjamin Grégoire, Sylvain Heraud
2010Analysing Unlinkability and Anonymity Using the Applied Pi Calculus.
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan
2010Approximation and Randomization for Quantitative Information-Flow Analysis.
Boris Köpf, Andrey Rybalchenko
2010Automating Open Bisimulation Checking for the Spi Calculus.
Alwen Tiu, Jeremy E. Dawson
2010Constraining Credential Usage in Logic-Based Access Control.
Lujo Bauer, Limin Jia, Divya Sharma
2010Dynamic vs. Static Flow-Sensitive Security Analysis.
Alejandro Russo, Andrei Sabelfeld
2010Formal Verification of Privacy for RFID Systems.
Mayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog
2010Impossibility Results for Secret Establishment.
Benedikt Schmidt, Patrick Schaller, David A. Basin
2010Information Flow Monitor Inlining.
Andrey Chudnov, David A. Naumann
2010Information Flow in Credential Systems.
Moritz Y. Becker
2010Modeling and Verifying Ad Hoc Routing Protocols.
Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune
2010On Protection by Layout Randomization.
Martín Abadi, Gordon D. Plotkin
2010Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010
2010Protocol Composition for Arbitrary Primitives.
Stefan Ciobaca, Véronique Cortier
2010Quantification of Integrity.
Michael R. Clarkson, Fred B. Schneider
2010Quantitative Information Flow - Verification Hardness and Possibilities.
Hirotoshi Yasuoka, Tachio Terauchi
2010Required Information Release.
Stephen Chong
2010Robustness Guarantees for Anonymity.
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi
2010Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
Simon Meier, Cas Cremers, David A. Basin
2010Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Adam J. Lee, Ting Yu
2010Towards a Formal Foundation of Web Security.
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell, Dawn Song
2010Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks.
Boris Köpf, Geoffrey Smith