Search dblp for Publications

export results for "toc:db/conf/csfw/csf2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/AbadiP10,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {On Protection by Layout Randomization},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {337--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.30},
  doi          = {10.1109/CSF.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AbadiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AkhaweBLMS10,
  author       = {Devdatta Akhawe and
                  Adam Barth and
                  Peifung E. Lam and
                  John C. Mitchell and
                  Dawn Song},
  title        = {Towards a Formal Foundation of Web Security},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {290--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.27},
  doi          = {10.1109/CSF.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AkhaweBLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCRR10,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Analysing Unlinkability and Anonymity Using the Applied Pi Calculus},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {107--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.15},
  doi          = {10.1109/CSF.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisCRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArnaudCD10,
  author       = {Mathilde Arnaud and
                  V{\'{e}}ronique Cortier and
                  St{\'{e}}phanie Delaune},
  title        = {Modeling and Verifying Ad Hoc Routing Protocols},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {59--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.12},
  doi          = {10.1109/CSF.2010.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArnaudCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheHBGH10,
  author       = {Gilles Barthe and
                  Daniel Hedin and
                  Santiago Zanella B{\'{e}}guelin and
                  Benjamin Gr{\'{e}}goire and
                  Sylvain Heraud},
  title        = {A Machine-Checked Formalization of Sigma-Protocols},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {246--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.24},
  doi          = {10.1109/CSF.2010.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheHBGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheHLRW10,
  author       = {Gilles Barthe and
                  Alejandro Hevia and
                  Zhengqin Luo and
                  Tamara Rezk and
                  Bogdan Warinschi},
  title        = {Robustness Guarantees for Anonymity},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {91--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.14},
  doi          = {10.1109/CSF.2010.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheHLRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BauerJS10,
  author       = {Lujo Bauer and
                  Limin Jia and
                  Divya Sharma},
  title        = {Constraining Credential Usage in Logic-Based Access Control},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {154--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.18},
  doi          = {10.1109/CSF.2010.18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BauerJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Becker10,
  author       = {Moritz Y. Becker},
  title        = {Information Flow in Credential Systems},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {171--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.19},
  doi          = {10.1109/CSF.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Becker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BrusoCH10,
  author       = {Mayla Brus{\`{o}} and
                  Konstantinos Chatzikokolakis and
                  Jerry den Hartog},
  title        = {Formal Verification of Privacy for {RFID} Systems},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {75--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.13},
  doi          = {10.1109/CSF.2010.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BrusoCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Chong10,
  author       = {Stephen Chong},
  title        = {Required Information Release},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {215--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.22},
  doi          = {10.1109/CSF.2010.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Chong10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChudnovN10,
  author       = {Andrey Chudnov and
                  David A. Naumann},
  title        = {Information Flow Monitor Inlining},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {200--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.21},
  doi          = {10.1109/CSF.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChudnovN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CiobacaC10,
  author       = {{\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  V{\'{e}}ronique Cortier},
  title        = {Protocol Composition for Arbitrary Primitives},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {322--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.29},
  doi          = {10.1109/CSF.2010.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CiobacaC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ClarksonS10,
  author       = {Michael R. Clarkson and
                  Fred B. Schneider},
  title        = {Quantification of Integrity},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {28--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.10},
  doi          = {10.1109/CSF.2010.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ClarksonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GarayKZ10,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {A Framework for the Sound Specification of Cryptographic Tasks},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {277--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.26},
  doi          = {10.1109/CSF.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GarayKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KopfR10,
  author       = {Boris K{\"{o}}pf and
                  Andrey Rybalchenko},
  title        = {Approximation and Randomization for Quantitative Information-Flow
                  Analysis},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {3--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.8},
  doi          = {10.1109/CSF.2010.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KopfR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KopfS10,
  author       = {Boris K{\"{o}}pf and
                  Geoffrey Smith},
  title        = {Vulnerability Bounds and Leakage Resilience of Blinded Cryptography
                  under Timing Attacks},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {44--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.11},
  doi          = {10.1109/CSF.2010.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KopfS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {A Game-Based Definition of Coercion-Resistance and Its Applications},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.16},
  doi          = {10.1109/CSF.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LeeY10,
  author       = {Adam J. Lee and
                  Ting Yu},
  title        = {Towards Quantitative Analysis of Proofs of Authorization: Applications,
                  Framework, and Techniques},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {139--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.17},
  doi          = {10.1109/CSF.2010.17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/LeeY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MeierCB10,
  author       = {Simon Meier and
                  Cas Cremers and
                  David A. Basin},
  title        = {Strong Invariants for the Efficient Construction of Machine-Checked
                  Protocol Security Proofs},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {231--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.23},
  doi          = {10.1109/CSF.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MeierCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RussoS10,
  author       = {Alejandro Russo and
                  Andrei Sabelfeld},
  title        = {Dynamic vs. Static Flow-Sensitive Security Analysis},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {186--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.20},
  doi          = {10.1109/CSF.2010.20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/RussoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchmidtSB10,
  author       = {Benedikt Schmidt and
                  Patrick Schaller and
                  David A. Basin},
  title        = {Impossibility Results for Secret Establishment},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {261--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.25},
  doi          = {10.1109/CSF.2010.25},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SchmidtSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/TiuD10,
  author       = {Alwen Tiu and
                  Jeremy E. Dawson},
  title        = {Automating Open Bisimulation Checking for the Spi Calculus},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {307--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.28},
  doi          = {10.1109/CSF.2010.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/TiuD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/YasuokaT10,
  author       = {Hirotoshi Yasuoka and
                  Tachio Terauchi},
  title        = {Quantitative Information Flow - Verification Hardness and Possibilities},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {15--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.9},
  doi          = {10.1109/CSF.2010.9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/YasuokaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2010,
  title        = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5552633/proceeding},
  isbn         = {978-0-7695-4082-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics