Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/csf2014.bht:"
@inproceedings{DBLP:conf/csfw/AdaoBRFL14, author = {Pedro Ad{\~{a}}o and Claudio Bozzato and G. Dei Rossi and Riccardo Focardi and Flaminia L. Luccio}, title = {Mignis: {A} Semantic Based Tool for Firewall Configuration}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {351--365}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.32}, doi = {10.1109/CSF.2014.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AdaoBRFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AkinyeleBGSS14, author = {Joseph A. Akinyele and Gilles Barthe and Benjamin Gr{\'{e}}goire and Benedikt Schmidt and Pierre{-}Yves Strub}, title = {Certified Synthesis of Efficient Batch Verifiers}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {153--165}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.19}, doi = {10.1109/CSF.2014.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AkinyeleBGSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AlvimCMMPS14, author = {M{\'{a}}rio S. Alvim and Konstantinos Chatzikokolakis and Annabelle McIver and Carroll Morgan and Catuscia Palamidessi and Geoffrey Smith}, title = {Additive and Multiplicative Notions of Leakage, and Their Capacities}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {308--322}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.29}, doi = {10.1109/CSF.2014.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AlvimCMMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesMM14, author = {Michael Backes and Praveen Manoharan and Esfandiar Mohammadi}, title = {{TUC:} Time-Sensitive and Modular Analysis of Anonymous Communication}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {383--397}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.34}, doi = {10.1109/CSF.2014.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheGAHKS14, author = {Gilles Barthe and Marco Gaboardi and Emilio Jes{\'{u}}s Gallego Arias and Justin Hsu and C{\'{e}}sar Kunz and Pierre{-}Yves Strub}, title = {Proving Differential Privacy in Hoare Logic}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {411--424}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.36}, doi = {10.1109/CSF.2014.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BartheGAHKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinCH14, author = {David A. Basin and Cas Cremers and Marko Horvat}, title = {Actor Key Compromise: Consequences and Countermeasures}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {244--258}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.25}, doi = {10.1109/CSF.2014.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BogdanovLLP14, author = {Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen}, title = {From Input Private to Universally Composable Secure Multi-party Computation Primitives}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {184--198}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.21}, doi = {10.1109/CSF.2014.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BogdanovLLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BugliesiCFKT14, author = {Michele Bugliesi and Stefano Calzavara and Riccardo Focardi and Wilayat Khan and Mauro Tempesta}, title = {Provably Sound Browser-Based Enforcement of Web Session Integrity}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {366--380}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.33}, doi = {10.1109/CSF.2014.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BugliesiCFKT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BuirasSR14, author = {Pablo Buiras and Deian Stefan and Alejandro Russo}, title = {On Dynamic Flow-Sensitive Floating-Label Systems}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {65--79}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.13}, doi = {10.1109/CSF.2014.13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BuirasSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChaseKLM14, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Malleable Signatures: New Definitions and Delegatable Anonymous Credentials}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {199--213}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.22}, doi = {10.1109/CSF.2014.22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ChaseKLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChudnovKN14, author = {Andrey Chudnov and George Kuan and David A. Naumann}, title = {Information Flow Monitoring as Abstract Interpretation for Relational Logic}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {48--62}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.12}, doi = {10.1109/CSF.2014.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChudnovKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CramptonP14, author = {Jason Crampton and Alexandre Pinto}, title = {Attribute-Based Encryption for Access Control Using Elementary Operations}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {125--139}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.17}, doi = {10.1109/CSF.2014.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CramptonP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CulnaneS14, author = {Chris Culnane and Steve A. Schneider}, title = {A Peered Bulletin Board for Robust Use in Verifiable Voting Systems}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {169--183}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.20}, doi = {10.1109/CSF.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CulnaneS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DimoulasMAC14, author = {Christos Dimoulas and Scott Moore and Aslan Askarov and Stephen Chong}, title = {Declarative Policies for Capability Control}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.9}, doi = {10.1109/CSF.2014.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DimoulasMAC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DoughertyG14, author = {Daniel J. Dougherty and Joshua D. Guttman}, title = {Decidability for Lightweight Diffie-Hellman Protocols}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {217--231}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.23}, doi = {10.1109/CSF.2014.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DoughertyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GrossklagsR14, author = {Jens Grossklags and David Reitter}, title = {How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {111--122}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.16}, doi = {10.1109/CSF.2014.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GrossklagsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HarbachFS14, author = {Marian Harbach and Sascha Fahl and Matthew Smith}, title = {Who's Afraid of Which Bad Wolf? {A} Survey of {IT} Security Risk Awareness}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {97--110}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.15}, doi = {10.1109/CSF.2014.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HarbachFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HsuGHKNPR14, author = {Justin Hsu and Marco Gaboardi and Andreas Haeberlen and Sanjeev Khanna and Arjun Narayan and Benjamin C. Pierce and Aaron Roth}, title = {Differential Privacy: An Economic Method for Choosing Epsilon}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {398--410}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.35}, doi = {10.1109/CSF.2014.35}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HsuGHKNPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JagadeesanLPRW14, author = {Radha Jagadeesan and C. M. Lubinski and Corin Pitcher and James Riely and Charles Winebrinner}, title = {Certificates for Verifiable Forensics}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {33--47}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.11}, doi = {10.1109/CSF.2014.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JagadeesanLPRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JohnsonLG14, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags}, title = {The Complexity of Estimating Systematic Risk in Networks}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {325--336}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.30}, doi = {10.1109/CSF.2014.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JohnsonLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KrollSA14, author = {Joshua A. Kroll and Gordon Stewart and Andrew W. Appel}, title = {Portable Software Fault Isolation}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.10}, doi = {10.1109/CSF.2014.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KrollSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiskovT14, author = {Moses D. Liskov and F. Javier Thayer}, title = {Modeling Diffie-Hellman Derivability for Automated Analysis}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {232--243}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.24}, doi = {10.1109/CSF.2014.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiskovT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiuRC14, author = {Jia Liu and Mark Dermot Ryan and Liqun Chen}, title = {Balancing Societal Security and Individual Privacy: Accountable Escrow System}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {427--440}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.37}, doi = {10.1109/CSF.2014.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiuRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MalozemoffKG14, author = {Alex J. Malozemoff and Jonathan Katz and Matthew D. Green}, title = {Automated Analysis and Synthesis of Block-Cipher Modes of Operation}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {140--152}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.18}, doi = {10.1109/CSF.2014.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MalozemoffKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MantelPS14, author = {Heiko Mantel and Matthias Perner and Jens Sauer}, title = {Noninterference under Weak Memory Models}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {80--94}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.14}, doi = {10.1109/CSF.2014.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MantelPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ModersheimK14, author = {Sebastian M{\"{o}}dersheim and Georgios Katsoris}, title = {A Sound Abstraction of the Parsing Problem}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {259--273}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.26}, doi = {10.1109/CSF.2014.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ModersheimK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RafnssonS14, author = {Willard Rafnsson and Andrei Sabelfeld}, title = {Compositional Information-Flow Security for Interactive Systems}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {277--292}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.27}, doi = {10.1109/CSF.2014.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RafnssonS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/VanhoefGDPR14, author = {Mathy Vanhoef and Willem De Groef and Dominique Devriese and Frank Piessens and Tamara Rezk}, title = {Stateful Declassification Policies for Event-Driven Programs}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {293--307}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.28}, doi = {10.1109/CSF.2014.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/VanhoefGDPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/VigoNN14, author = {Roberto Vigo and Flemming Nielson and Hanne Riis Nielson}, title = {Automated Generation of Attack Trees}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {337--350}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.31}, doi = {10.1109/CSF.2014.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/VigoNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2014, title = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6954678/proceeding}, isbn = {978-1-4799-4290-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.