Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/post/post2014.bht:"
@inproceedings{DBLP:conf/post/AlvimSS14, author = {M{\'{a}}rio S. Alvim and Andre Scedrov and Fred B. Schneider}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {When Not All Bits Are Equal: Worth-Based Information Flow}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {120--139}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_7}, doi = {10.1007/978-3-642-54792-8\_7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/AlvimSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisLRR14, author = {Myrto Arapinis and Jia Liu and Eike Ritter and Mark Ryan}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Stateful Applied Pi Calculus}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {22--41}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_2}, doi = {10.1007/978-3-642-54792-8\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisLRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArnoldHPS14, author = {Florian Arnold and Holger Hermanns and Reza Pulungan and Mari{\"{e}}lle Stoelinga}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Time-Dependent Analysis of Attacks}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {285--305}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_16}, doi = {10.1007/978-3-642-54792-8\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ArnoldHPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BackesMR14, author = {Michael Backes and Esfandiar Mohammadi and Tim Ruffing}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {42--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_3}, doi = {10.1007/978-3-642-54792-8\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/BackesMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BaeldeDH14, author = {David Baelde and St{\'{e}}phanie Delaune and Lucca Hirschi}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_1}, doi = {10.1007/978-3-642-54792-8\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BaeldeDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BarbosaCS14, author = {Manuel Barbosa and David Castro and Paulo F. Silva}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Compiling {CAO:} From Cryptographic Specifications to {C} Implementations}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {240--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_13}, doi = {10.1007/978-3-642-54792-8\_13}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BarbosaCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BartheKMO14, author = {Gilles Barthe and Boris K{\"{o}}pf and Laurent Mauborgne and Mart{\'{\i}}n Ochoa}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Leakage Resilience against Concurrent Cache Attacks}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {140--158}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_8}, doi = {10.1007/978-3-642-54792-8\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/BartheKMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BichhawatRGH14, author = {Abhishek Bichhawat and Vineet Rajani and Deepak Garg and Christian Hammer}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Information Flow Control in WebKit's JavaScript Bytecode}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {159--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_9}, doi = {10.1007/978-3-642-54792-8\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BichhawatRGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChadhaKV14, author = {Rohit Chadha and Dileep Kini and Mahesh Viswanathan}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Quantitative Information Flow in Boolean Programs}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {103--119}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_6}, doi = {10.1007/978-3-642-54792-8\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChadhaKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ClarksonFKMRS14, author = {Michael R. Clarkson and Bernd Finkbeiner and Masoud Koleini and Kristopher K. Micinski and Markus N. Rabe and C{\'{e}}sar S{\'{a}}nchez}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Temporal Logics for Hyperproperties}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {265--284}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_15}, doi = {10.1007/978-3-642-54792-8\_15}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ClarksonFKMRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/CostanzoS14, author = {David Costanzo and Zhong Shao}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {A Separation Logic for Enforcing Declarative Information Flow Control Policies}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {179--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_10}, doi = {10.1007/978-3-642-54792-8\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/CostanzoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DaubignardLS14, author = {Marion Daubignard and David Lubicz and Graham Steel}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {A Secure Key Management Interface with Asymmetric Cryptography}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {63--82}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_4}, doi = {10.1007/978-3-642-54792-8\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/DaubignardLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/KustersSTG14, author = {Ralf K{\"{u}}sters and Enrico Scapin and Tomasz Truderung and Juergen Graf}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {220--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_12}, doi = {10.1007/978-3-642-54792-8\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/KustersSTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/LiuM14, author = {Jed Liu and Andrew C. Myers}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Defining and Enforcing Referential Security}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {199--219}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_11}, doi = {10.1007/978-3-642-54792-8\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/LiuM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/McIverMSEM14, author = {Annabelle McIver and Carroll Morgan and Geoffrey Smith and Barbara Espinoza and Larissa Meinicke}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Abstract Channels and Their Robust Information-Leakage Ordering}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {83--102}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_5}, doi = {10.1007/978-3-642-54792-8\_5}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/McIverMSEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/TsankovMDB14, author = {Petar Tsankov and Srdjan Marinovic and Mohammad Torabi Dashti and David A. Basin}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Decentralized Composite Access Control}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {245--264}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_14}, doi = {10.1007/978-3-642-54792-8\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/TsankovMDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2014, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8}, doi = {10.1007/978-3-642-54792-8}, isbn = {978-3-642-54791-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.