


default search action
23rd CSF 2010: Edinburgh, United Kingdom
- Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4082-5

- Boris Köpf, Andrey Rybalchenko:

Approximation and Randomization for Quantitative Information-Flow Analysis. 3-14 - Hirotoshi Yasuoka, Tachio Terauchi

:
Quantitative Information Flow - Verification Hardness and Possibilities. 15-27 - Michael R. Clarkson, Fred B. Schneider:

Quantification of Integrity. 28-43 - Boris Köpf, Geoffrey Smith:

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. 44-56 - Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune:

Modeling and Verifying Ad Hoc Routing Protocols. 59-74 - Mayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog:

Formal Verification of Privacy for RFID Systems. 75-88 - Gilles Barthe

, Alejandro Hevia
, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi:
Robustness Guarantees for Anonymity. 91-106 - Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan

:
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. 107-121 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:

A Game-Based Definition of Coercion-Resistance and Its Applications. 122-136 - Adam J. Lee

, Ting Yu:
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. 139-153 - Lujo Bauer

, Limin Jia
, Divya Sharma:
Constraining Credential Usage in Logic-Based Access Control. 154-168 - Moritz Y. Becker:

Information Flow in Credential Systems. 171-185 - Alejandro Russo

, Andrei Sabelfeld:
Dynamic vs. Static Flow-Sensitive Security Analysis. 186-199 - Andrey Chudnov, David A. Naumann

:
Information Flow Monitor Inlining. 200-214 - Stephen Chong:

Required Information Release. 215-227 - Simon Meier, Cas Cremers, David A. Basin:

Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. 231-245 - Gilles Barthe

, Daniel Hedin, Santiago Zanella-Béguelin, Benjamin Grégoire, Sylvain Heraud:
A Machine-Checked Formalization of Sigma-Protocols. 246-260 - Benedikt Schmidt, Patrick Schaller, David A. Basin:

Impossibility Results for Secret Establishment. 261-273 - Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou

:
A Framework for the Sound Specification of Cryptographic Tasks. 277-289 - Devdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell

, Dawn Song:
Towards a Formal Foundation of Web Security. 290-304 - Alwen Tiu, Jeremy E. Dawson

:
Automating Open Bisimulation Checking for the Spi Calculus. 307-321 - Stefan Ciobaca, Véronique Cortier:

Protocol Composition for Arbitrary Primitives. 322-336 - Martín Abadi, Gordon D. Plotkin:

On Protection by Layout Randomization. 337-351

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














