


default search action
33rd CSF 2020: Boston, MA, USA
- 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020. IEEE 2020, ISBN 978-1-7281-6572-1

E-Voting
- David A. Basin, Sasa Radomirovic

, Lara Schmid:
Dispute Resolution in Voting. 1-16 - Véronique Cortier, Joseph Lallemand, Bogdan Warinschi:

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. 17-32 - Vincenzo Iovino, Alfredo Rial, Peter B. Rønne

, Peter Y. A. Ryan:
Universal Unconditional Verifiability in E-Voting without Trusted Parties. 33-48 - Thomas Haines, Johannes Müller

:
SoK: Techniques for Verifiable Mix Nets. 49-64
Information Flow (I)
- Maximilian Algehed, Cormac Flanagan:

Transparent IFC Enforcement: Possibility and (In)Efficiency Results. 65-78 - Daniel Schoepe, Toby Murray, Andrei Sabelfeld:

VERONICA: Expressive and Precise Concurrent Information Flow Security. 79-94 - Johan Bay, Aslan Askarov:

Reconciling progress-insensitive noninterference and declassification. 95-106
Language-Based Security
- Stefano Calzavara

, Riccardo Focardi
, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. 107-122 - Andrew K. Hirsch

, Pedro H. Azevedo de Amorim, Ethan Cecchetti
, Ross Tate, Owen Arden:
First-Order Logic for Flow-Limited Authorization. 123-138 - Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco:

Types and Abstract Interpretation for Authorization Hook Advice. 139-152
Privacy
- Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi

:
Optimal Obfuscation Mechanisms via Machine Learning. 153-168 - David Baelde, Stéphanie Delaune, Solène Moreau:

A Method for Proving Unlinkability of Stateful Protocols. 169-183
Information Flow (II)
- Kristopher K. Micinski, David Darais, Thomas Gilray:

Abstracting Faceted Execution. 184-198 - Yi Lu, Chenyi Zhang

:
Nontransitive Security Types for Coarse-grained Information Flow Control. 199-213 - Carlos Tomé Cortiñas

, Marco Vassena, Alejandro Russo
:
Securing Asynchronous Exceptions. 214-229
Secure Systems
- Andreas Fischer, Jonas Janneck

, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden:
PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage. 230-245 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu:

Runtime Enforcement for Control System Security. 246-261 - Matteo Busi

, Job Noorman, Jo Van Bulck
, Letterio Galletta
, Pierpaolo Degano, Jan Tobias Mühlberg
, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. 262-276
Applied Cryptography and Protocol Analysis
- Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev

, Nick Sullivan:
Limiting the impact of unreliable randomness in deployed security protocols. 277-287 - Cyprien Delpech de Saint Guilhem

, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. 288-303 - Riccardo Focardi

, Flaminia L. Luccio
:
Automated Analysis of PUF-based Protocols. 304-317
Blockchain
- Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou:

Anonymous Lottery In The Proof-of-Stake Setting. 318-333 - Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos

:
A Composable Security Treatment of the Lightning Network. 334-349
Information Flow (III)
- Iulia Bastys

, Musard Balliu, Tamara Rezk, Andrei Sabelfeld:
Clockwork: Tracking Remote Timing Attacks. 350-365 - Borzoo Bonakdarpour, Bernd Finkbeiner:

Controller Synthesis for Hyperproperties. 366-379 - Nicholas Coughlin

, Graeme Smith
:
Rely/Guarantee Reasoning for Noninterference in Non-Blocking Algorithms. 380-394
Attack Modeling
- Barbara Fila, Wojciech Widel:

Exploiting attack-defense trees to find an optimal set of countermeasures. 395-410 - Tim Muller, Dongxia Wang, Jun Sun:

Provably Robust Decisions based on Potentially Malicious Sources of Information. 411-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














