Search dblp for Publications

export results for "toc:db/conf/csfw/csfw2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/0001FP19,
  author       = {Konstantinos Chatzikokolakis and
                  Natasha Fernandes and
                  Catuscia Palamidessi},
  title        = {Comparing Systems: Max-Case Refinement Orders and Application to Differential
                  Privacy},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {442--457},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00037},
  doi          = {10.1109/CSF.2019.00037},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/0001FP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AbateB0HPT19,
  author       = {Carmine Abate and
                  Roberto Blanco and
                  Deepak Garg and
                  Catalin Hritcu and
                  Marco Patrignani and
                  J{\'{e}}r{\'{e}}my Thibault},
  title        = {Journey Beyond Full Abstraction: Exploring Robust Property Preservation
                  for Secure Compilation},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {256--271},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00025},
  doi          = {10.1109/CSF.2019.00025},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AbateB0HPT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AlgehedRF19,
  author       = {Maximilian Algehed and
                  Alejandro Russo and
                  Cormac Flanagan},
  title        = {Optimising Faceted Secure Multi-Execution},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {1--16},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00008},
  doi          = {10.1109/CSF.2019.00008},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AlgehedRF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AmericoKM19,
  author       = {Arthur Am{\'{e}}rico and
                  M. H. R. Khouzani and
                  Pasquale Malacaria},
  title        = {Deterministic Channel Design for Minimum Leakage},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {428--441},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00036},
  doi          = {10.1109/CSF.2019.00036},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AmericoKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AntonopoulosT19,
  author       = {Timos Antonopoulos and
                  Tachio Terauchi},
  title        = {Games for Security Under Adaptive Adversaries},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {216--229},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00022},
  doi          = {10.1109/CSF.2019.00022},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/AntonopoulosT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BalliuMP19,
  author       = {Musard Balliu and
                  Massimo Merro and
                  Michele Pasqua},
  title        = {Securing Cross-App Interactions in IoT Platforms},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {319--334},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00029},
  doi          = {10.1109/CSF.2019.00029},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BalliuMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheGJKS19,
  author       = {Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Charlie Jacomme and
                  Steve Kremer and
                  Pierre{-}Yves Strub},
  title        = {Symbolic Methods in Computational Cryptography Proofs},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {136--151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00017},
  doi          = {10.1109/CSF.2019.00017},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheGJKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BessonDJ19,
  author       = {Fr{\'{e}}d{\'{e}}ric Besson and
                  Alexandre Dang and
                  Thomas P. Jensen},
  title        = {Information-Flow Preservation in Compiler Optimisations},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {230--242},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00023},
  doi          = {10.1109/CSF.2019.00023},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BessonDJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CanettiSV19,
  author       = {Ran Canetti and
                  Alley Stoughton and
                  Mayank Varia},
  title        = {EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable
                  Security},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {167--183},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00019},
  doi          = {10.1109/CSF.2019.00019},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CanettiSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CheangRSS19,
  author       = {Kevin Cheang and
                  Cameron Rasmussen and
                  Sanjit A. Seshia and
                  Pramod Subramanyan},
  title        = {A Formal Approach to Secure Speculation},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {288--303},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00027},
  doi          = {10.1109/CSF.2019.00027},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CheangRSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CortierFL19,
  author       = {V{\'{e}}ronique Cortier and
                  Alicia Filipiak and
                  Joseph Lallemand},
  title        = {BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {367--381},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00032},
  doi          = {10.1109/CSF.2019.00032},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CortierFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CremersJ19,
  author       = {Cas Cremers and
                  Dennis Jackson},
  title        = {Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks
                  on Protocols using Diffie-Hellman},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {78--93},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00013},
  doi          = {10.1109/CSF.2019.00013},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CremersJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DaxKT019,
  author       = {Alexander Dax and
                  Robert K{\"{u}}nnemann and
                  Sven Tangermann and
                  Michael Backes},
  title        = {How to Wrap it up - {A} Formally Verified Proposal for the use of
                  Authenticated Wrapping in PKCS{\#}11},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {62--77},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00012},
  doi          = {10.1109/CSF.2019.00012},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/DaxKT019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FilaW19,
  author       = {Barbara Fila and
                  Wojciech Widel},
  title        = {Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {200--215},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00021},
  doi          = {10.1109/CSF.2019.00021},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FilaW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FinkbeinerHT19,
  author       = {Bernd Finkbeiner and
                  Lennart Haas and
                  Hazem Torfah},
  title        = {Canonical Representations of k-Safety Hyperproperties},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {17--31},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00009},
  doi          = {10.1109/CSF.2019.00009},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FinkbeinerHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GollamudiCA19,
  author       = {Anitha Gollamudi and
                  Stephen Chong and
                  Owen Arden},
  title        = {Information Flow Control for Distributed Trusted Execution Environments},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {304--318},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00028},
  doi          = {10.1109/CSF.2019.00028},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GollamudiCA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Koutsos19,
  author       = {Adrien Koutsos},
  title        = {Decidability of a Sound Set of Inference Rules for Computational Indistinguishability},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {48--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00011},
  doi          = {10.1109/CSF.2019.00011},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Koutsos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KozyriSBDT19,
  author       = {Elisavet Kozyri and
                  Fred B. Schneider and
                  Andrew Bedford and
                  Jos{\'{e}}e Desharnais and
                  Nadia Tawbi},
  title        = {Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {351--366},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00031},
  doi          = {10.1109/CSF.2019.00031},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KozyriSBDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KunnemannE019,
  author       = {Robert K{\"{u}}nnemann and
                  Ilkan Esiyok and
                  Michael Backes},
  title        = {Automated Verification of Accountability in Security Protocols},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {397--413},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00034},
  doi          = {10.1109/CSF.2019.00034},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KunnemannE019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LochbihlerSBM19,
  author       = {Andreas Lochbihler and
                  S. Reza Sefidgar and
                  David A. Basin and
                  Ueli Maurer},
  title        = {Formalizing Constructive Cryptography using CryptHOL},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {152--166},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00018},
  doi          = {10.1109/CSF.2019.00018},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/LochbihlerSBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MantelP19,
  author       = {Heiko Mantel and
                  Christian W. Probst},
  title        = {On the Meaning and Purpose of Attack Trees},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {184--199},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00020},
  doi          = {10.1109/CSF.2019.00020},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/MantelP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Mestel19,
  author       = {David Mestel},
  title        = {Quantifying Information Flow in Interactive Systems},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {414--427},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00035},
  doi          = {10.1109/CSF.2019.00035},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Mestel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PedersenA19,
  author       = {Mathias Vorreiter Pedersen and
                  Aslan Askarov},
  title        = {Static Enforcement of Security in Runtime Systems},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {335--350},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00030},
  doi          = {10.1109/CSF.2019.00030},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/PedersenA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Shi19,
  author       = {Elaine Shi},
  title        = {Analysis of Deterministic Longest-Chain Protocols},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {122--135},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00016},
  doi          = {10.1109/CSF.2019.00016},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Shi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/TsampasDP19,
  author       = {Stelios Tsampas and
                  Dominique Devriese and
                  Frank Piessens},
  title        = {Temporal Safety for Stack Allocated Memory on Capability Machines},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {243--255},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00024},
  doi          = {10.1109/CSF.2019.00024},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/TsampasDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/UrquizaAKKNST19,
  author       = {Abra{\~{a}}o Aires Urquiza and
                  Musab A. AlTurki and
                  Max I. Kanovich and
                  Tajana Ban Kirigin and
                  Vivek Nigam and
                  Andre Scedrov and
                  Carolyn L. Talcott},
  title        = {Resource-Bounded Intruders in Denial of Service Attacks},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {382--396},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00033},
  doi          = {10.1109/CSF.2019.00033},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/UrquizaAKKNST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VasilikosNNK19,
  author       = {Panagiotis Vasilikos and
                  Hanne Riis Nielson and
                  Flemming Nielson and
                  Boris K{\"{o}}pf},
  title        = {Timing Leaks and Coarse-Grained Clocks},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {32--47},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00010},
  doi          = {10.1109/CSF.2019.00010},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/VasilikosNNK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/YuAV19,
  author       = {Jiangshan Yu and
                  Man Ho Allen Au and
                  Paulo Jorge Esteves Ver{\'{\i}}ssimo},
  title        = {Re-Thinking Untraceability in the CryptoNote-Style Blockchain},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {94--107},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00014},
  doi          = {10.1109/CSF.2019.00014},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/YuAV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ZagieboyloSM19,
  author       = {Drew Zagieboylo and
                  G. Edward Suh and
                  Andrew C. Myers},
  title        = {Using Information Flow to Design an {ISA} that Controls Timing Channels},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {272--287},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00026},
  doi          = {10.1109/CSF.2019.00026},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ZagieboyloSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ZolotavkinGL19,
  author       = {Yevhen Zolotavkin and
                  Juli{\'{a}}n Garc{\'{\i}}a and
                  Joseph Liu},
  title        = {Time-Dependent Decision-Making and Decentralization in Proof-of-Work
                  Cryptocurrencies},
  booktitle    = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  pages        = {108--121},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSF.2019.00015},
  doi          = {10.1109/CSF.2019.00015},
  timestamp    = {Mon, 09 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/ZolotavkinGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2019,
  title        = {32nd {IEEE} Computer Security Foundations Symposium, {CSF} 2019, Hoboken,
                  NJ, USA, June 25-28, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8804915/proceeding},
  isbn         = {978-1-7281-1407-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics