Search dblp for Publications

export results for "toc:db/conf/post/post2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/post/AlvimSS14,
  author       = {M{\'{a}}rio S. Alvim and
                  Andre Scedrov and
                  Fred B. Schneider},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {When Not All Bits Are Equal: Worth-Based Information Flow},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {120--139},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_7},
  doi          = {10.1007/978-3-642-54792-8\_7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AlvimSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisLRR14,
  author       = {Myrto Arapinis and
                  Jia Liu and
                  Eike Ritter and
                  Mark Ryan},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Stateful Applied Pi Calculus},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_2},
  doi          = {10.1007/978-3-642-54792-8\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisLRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArnoldHPS14,
  author       = {Florian Arnold and
                  Holger Hermanns and
                  Reza Pulungan and
                  Mari{\"{e}}lle Stoelinga},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Time-Dependent Analysis of Attacks},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {285--305},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_16},
  doi          = {10.1007/978-3-642-54792-8\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ArnoldHPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BackesMR14,
  author       = {Michael Backes and
                  Esfandiar Mohammadi and
                  Tim Ruffing},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Computational Soundness Results for ProVerif - Bridging the Gap from
                  Trace Properties to Uniformity},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {42--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_3},
  doi          = {10.1007/978-3-642-54792-8\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/BackesMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BaeldeDH14,
  author       = {David Baelde and
                  St{\'{e}}phanie Delaune and
                  Lucca Hirschi},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {A Reduced Semantics for Deciding Trace Equivalence Using Constraint
                  Systems},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_1},
  doi          = {10.1007/978-3-642-54792-8\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BaeldeDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BarbosaCS14,
  author       = {Manuel Barbosa and
                  David Castro and
                  Paulo F. Silva},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Compiling {CAO:} From Cryptographic Specifications to {C} Implementations},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {240--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_13},
  doi          = {10.1007/978-3-642-54792-8\_13},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BarbosaCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BartheKMO14,
  author       = {Gilles Barthe and
                  Boris K{\"{o}}pf and
                  Laurent Mauborgne and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Leakage Resilience against Concurrent Cache Attacks},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_8},
  doi          = {10.1007/978-3-642-54792-8\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/BartheKMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BichhawatRGH14,
  author       = {Abhishek Bichhawat and
                  Vineet Rajani and
                  Deepak Garg and
                  Christian Hammer},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Information Flow Control in WebKit's JavaScript Bytecode},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_9},
  doi          = {10.1007/978-3-642-54792-8\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BichhawatRGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChadhaKV14,
  author       = {Rohit Chadha and
                  Dileep Kini and
                  Mahesh Viswanathan},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Quantitative Information Flow in Boolean Programs},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_6},
  doi          = {10.1007/978-3-642-54792-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChadhaKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ClarksonFKMRS14,
  author       = {Michael R. Clarkson and
                  Bernd Finkbeiner and
                  Masoud Koleini and
                  Kristopher K. Micinski and
                  Markus N. Rabe and
                  C{\'{e}}sar S{\'{a}}nchez},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Temporal Logics for Hyperproperties},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {265--284},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_15},
  doi          = {10.1007/978-3-642-54792-8\_15},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ClarksonFKMRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CostanzoS14,
  author       = {David Costanzo and
                  Zhong Shao},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {A Separation Logic for Enforcing Declarative Information Flow Control
                  Policies},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {179--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_10},
  doi          = {10.1007/978-3-642-54792-8\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/CostanzoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/DaubignardLS14,
  author       = {Marion Daubignard and
                  David Lubicz and
                  Graham Steel},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {A Secure Key Management Interface with Asymmetric Cryptography},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {63--82},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_4},
  doi          = {10.1007/978-3-642-54792-8\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/DaubignardLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/KustersSTG14,
  author       = {Ralf K{\"{u}}sters and
                  Enrico Scapin and
                  Tomasz Truderung and
                  Juergen Graf},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Extending and Applying a Framework for the Cryptographic Verification
                  of Java Programs},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {220--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_12},
  doi          = {10.1007/978-3-642-54792-8\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/KustersSTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/LiuM14,
  author       = {Jed Liu and
                  Andrew C. Myers},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Defining and Enforcing Referential Security},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {199--219},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_11},
  doi          = {10.1007/978-3-642-54792-8\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/LiuM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/McIverMSEM14,
  author       = {Annabelle McIver and
                  Carroll Morgan and
                  Geoffrey Smith and
                  Barbara Espinoza and
                  Larissa Meinicke},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Abstract Channels and Their Robust Information-Leakage Ordering},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {83--102},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_5},
  doi          = {10.1007/978-3-642-54792-8\_5},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/McIverMSEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/TsankovMDB14,
  author       = {Petar Tsankov and
                  Srdjan Marinovic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Decentralized Composite Access Control},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_14},
  doi          = {10.1007/978-3-642-54792-8\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/TsankovMDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2014,
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8},
  doi          = {10.1007/978-3-642-54792-8},
  isbn         = {978-3-642-54791-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics