Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/csfw2019.bht:"
@inproceedings{DBLP:conf/csfw/0001FP19, author = {Konstantinos Chatzikokolakis and Natasha Fernandes and Catuscia Palamidessi}, title = {Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {442--457}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00037}, doi = {10.1109/CSF.2019.00037}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/0001FP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AbateB0HPT19, author = {Carmine Abate and Roberto Blanco and Deepak Garg and Catalin Hritcu and Marco Patrignani and J{\'{e}}r{\'{e}}my Thibault}, title = {Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {256--271}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00025}, doi = {10.1109/CSF.2019.00025}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AbateB0HPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AlgehedRF19, author = {Maximilian Algehed and Alejandro Russo and Cormac Flanagan}, title = {Optimising Faceted Secure Multi-Execution}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {1--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00008}, doi = {10.1109/CSF.2019.00008}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AlgehedRF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AmericoKM19, author = {Arthur Am{\'{e}}rico and M. H. R. Khouzani and Pasquale Malacaria}, title = {Deterministic Channel Design for Minimum Leakage}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {428--441}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00036}, doi = {10.1109/CSF.2019.00036}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AmericoKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AntonopoulosT19, author = {Timos Antonopoulos and Tachio Terauchi}, title = {Games for Security Under Adaptive Adversaries}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {216--229}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00022}, doi = {10.1109/CSF.2019.00022}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/AntonopoulosT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BalliuMP19, author = {Musard Balliu and Massimo Merro and Michele Pasqua}, title = {Securing Cross-App Interactions in IoT Platforms}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {319--334}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00029}, doi = {10.1109/CSF.2019.00029}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BalliuMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheGJKS19, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Charlie Jacomme and Steve Kremer and Pierre{-}Yves Strub}, title = {Symbolic Methods in Computational Cryptography Proofs}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {136--151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00017}, doi = {10.1109/CSF.2019.00017}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BartheGJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BessonDJ19, author = {Fr{\'{e}}d{\'{e}}ric Besson and Alexandre Dang and Thomas P. Jensen}, title = {Information-Flow Preservation in Compiler Optimisations}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {230--242}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00023}, doi = {10.1109/CSF.2019.00023}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BessonDJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CanettiSV19, author = {Ran Canetti and Alley Stoughton and Mayank Varia}, title = {EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {167--183}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00019}, doi = {10.1109/CSF.2019.00019}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CanettiSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CheangRSS19, author = {Kevin Cheang and Cameron Rasmussen and Sanjit A. Seshia and Pramod Subramanyan}, title = {A Formal Approach to Secure Speculation}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {288--303}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00027}, doi = {10.1109/CSF.2019.00027}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CheangRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CortierFL19, author = {V{\'{e}}ronique Cortier and Alicia Filipiak and Joseph Lallemand}, title = {BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {367--381}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00032}, doi = {10.1109/CSF.2019.00032}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CortierFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CremersJ19, author = {Cas Cremers and Dennis Jackson}, title = {Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {78--93}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00013}, doi = {10.1109/CSF.2019.00013}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CremersJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DaxKT019, author = {Alexander Dax and Robert K{\"{u}}nnemann and Sven Tangermann and Michael Backes}, title = {How to Wrap it up - {A} Formally Verified Proposal for the use of Authenticated Wrapping in PKCS{\#}11}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {62--77}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00012}, doi = {10.1109/CSF.2019.00012}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DaxKT019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FilaW19, author = {Barbara Fila and Wojciech Widel}, title = {Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {200--215}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00021}, doi = {10.1109/CSF.2019.00021}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FilaW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FinkbeinerHT19, author = {Bernd Finkbeiner and Lennart Haas and Hazem Torfah}, title = {Canonical Representations of k-Safety Hyperproperties}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {17--31}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00009}, doi = {10.1109/CSF.2019.00009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FinkbeinerHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GollamudiCA19, author = {Anitha Gollamudi and Stephen Chong and Owen Arden}, title = {Information Flow Control for Distributed Trusted Execution Environments}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {304--318}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00028}, doi = {10.1109/CSF.2019.00028}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GollamudiCA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Koutsos19, author = {Adrien Koutsos}, title = {Decidability of a Sound Set of Inference Rules for Computational Indistinguishability}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {48--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00011}, doi = {10.1109/CSF.2019.00011}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Koutsos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KozyriSBDT19, author = {Elisavet Kozyri and Fred B. Schneider and Andrew Bedford and Jos{\'{e}}e Desharnais and Nadia Tawbi}, title = {Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {351--366}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00031}, doi = {10.1109/CSF.2019.00031}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KozyriSBDT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KunnemannE019, author = {Robert K{\"{u}}nnemann and Ilkan Esiyok and Michael Backes}, title = {Automated Verification of Accountability in Security Protocols}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {397--413}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00034}, doi = {10.1109/CSF.2019.00034}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/KunnemannE019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LochbihlerSBM19, author = {Andreas Lochbihler and S. Reza Sefidgar and David A. Basin and Ueli Maurer}, title = {Formalizing Constructive Cryptography using CryptHOL}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {152--166}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00018}, doi = {10.1109/CSF.2019.00018}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/LochbihlerSBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MantelP19, author = {Heiko Mantel and Christian W. Probst}, title = {On the Meaning and Purpose of Attack Trees}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {184--199}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00020}, doi = {10.1109/CSF.2019.00020}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/MantelP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Mestel19, author = {David Mestel}, title = {Quantifying Information Flow in Interactive Systems}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {414--427}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00035}, doi = {10.1109/CSF.2019.00035}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Mestel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/PedersenA19, author = {Mathias Vorreiter Pedersen and Aslan Askarov}, title = {Static Enforcement of Security in Runtime Systems}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {335--350}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00030}, doi = {10.1109/CSF.2019.00030}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/PedersenA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Shi19, author = {Elaine Shi}, title = {Analysis of Deterministic Longest-Chain Protocols}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {122--135}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00016}, doi = {10.1109/CSF.2019.00016}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Shi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/TsampasDP19, author = {Stelios Tsampas and Dominique Devriese and Frank Piessens}, title = {Temporal Safety for Stack Allocated Memory on Capability Machines}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {243--255}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00024}, doi = {10.1109/CSF.2019.00024}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/TsampasDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/UrquizaAKKNST19, author = {Abra{\~{a}}o Aires Urquiza and Musab A. AlTurki and Max I. Kanovich and Tajana Ban Kirigin and Vivek Nigam and Andre Scedrov and Carolyn L. Talcott}, title = {Resource-Bounded Intruders in Denial of Service Attacks}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {382--396}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00033}, doi = {10.1109/CSF.2019.00033}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/UrquizaAKKNST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/VasilikosNNK19, author = {Panagiotis Vasilikos and Hanne Riis Nielson and Flemming Nielson and Boris K{\"{o}}pf}, title = {Timing Leaks and Coarse-Grained Clocks}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {32--47}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00010}, doi = {10.1109/CSF.2019.00010}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/VasilikosNNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/YuAV19, author = {Jiangshan Yu and Man Ho Allen Au and Paulo Jorge Esteves Ver{\'{\i}}ssimo}, title = {Re-Thinking Untraceability in the CryptoNote-Style Blockchain}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {94--107}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00014}, doi = {10.1109/CSF.2019.00014}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/YuAV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ZagieboyloSM19, author = {Drew Zagieboylo and G. Edward Suh and Andrew C. Myers}, title = {Using Information Flow to Design an {ISA} that Controls Timing Channels}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {272--287}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00026}, doi = {10.1109/CSF.2019.00026}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ZagieboyloSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ZolotavkinGL19, author = {Yevhen Zolotavkin and Juli{\'{a}}n Garc{\'{\i}}a and Joseph Liu}, title = {Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies}, booktitle = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, pages = {108--121}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSF.2019.00015}, doi = {10.1109/CSF.2019.00015}, timestamp = {Mon, 09 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/ZolotavkinGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2019, title = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken, NJ, USA, June 25-28, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8804915/proceeding}, isbn = {978-1-7281-1407-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.