CSF A

30 papers

YearTitle / Authors
2014A Peered Bulletin Board for Robust Use in Verifiable Voting Systems.
Chris Culnane, Steve A. Schneider
2014A Sound Abstraction of the Parsing Problem.
Sebastian Mödersheim, Georgios Katsoris
2014Actor Key Compromise: Consequences and Countermeasures.
David A. Basin, Cas Cremers, Marko Horvat
2014Additive and Multiplicative Notions of Leakage, and Their Capacities.
Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith
2014Attribute-Based Encryption for Access Control Using Elementary Operations.
Jason Crampton, Alexandre Pinto
2014Automated Analysis and Synthesis of Block-Cipher Modes of Operation.
Alex J. Malozemoff, Jonathan Katz, Matthew D. Green
2014Automated Generation of Attack Trees.
Roberto Vigo, Flemming Nielson, Hanne Riis Nielson
2014Balancing Societal Security and Individual Privacy: Accountable Escrow System.
Jia Liu, Mark Dermot Ryan, Liqun Chen
2014Certificates for Verifiable Forensics.
Radha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely, Charles Winebrinner
2014Certified Synthesis of Efficient Batch Verifiers.
Joseph A. Akinyele, Gilles Barthe, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub
2014Compositional Information-Flow Security for Interactive Systems.
Willard Rafnsson, Andrei Sabelfeld
2014Decidability for Lightweight Diffie-Hellman Protocols.
Daniel J. Dougherty, Joshua D. Guttman
2014Declarative Policies for Capability Control.
Christos Dimoulas, Scott Moore, Aslan Askarov, Stephen Chong
2014Differential Privacy: An Economic Method for Choosing Epsilon.
Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth
2014From Input Private to Universally Composable Secure Multi-party Computation Primitives.
Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen
2014How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing.
Jens Grossklags, David Reitter
2014IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014
2014Information Flow Monitoring as Abstract Interpretation for Relational Logic.
Andrey Chudnov, George Kuan, David A. Naumann
2014Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2014Mignis: A Semantic Based Tool for Firewall Configuration.
Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio
2014Modeling Diffie-Hellman Derivability for Automated Analysis.
Moses D. Liskov, F. Javier Thayer
2014Noninterference under Weak Memory Models.
Heiko Mantel, Matthias Perner, Jens Sauer
2014On Dynamic Flow-Sensitive Floating-Label Systems.
Pablo Buiras, Deian Stefan, Alejandro Russo
2014Portable Software Fault Isolation.
Joshua A. Kroll, Gordon Stewart, Andrew W. Appel
2014Provably Sound Browser-Based Enforcement of Web Session Integrity.
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro Tempesta
2014Proving Differential Privacy in Hoare Logic.
Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, César Kunz, Pierre-Yves Strub
2014Stateful Declassification Policies for Event-Driven Programs.
Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk
2014TUC: Time-Sensitive and Modular Analysis of Anonymous Communication.
Michael Backes, Praveen Manoharan, Esfandiar Mohammadi
2014The Complexity of Estimating Systematic Risk in Networks.
Benjamin Johnson, Aron Laszka, Jens Grossklags
2014Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
Marian Harbach, Sascha Fahl, Matthew Smith