The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "POST"( http://dblp.L3S.de/Venues/POST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/post

Publication years (Num. hits)
2012 (23) 2013 (15) 2014 (17) 2015 (19) 2016-2017 (29) 2018 (15) 2019 (11)
Publication types (Num. hits)
inproceedings(121) proceedings(8)
Venues (Conferences, Journals, ...)
POST(129)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 129 publication records. Showing 129 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks 0001 Achieving Safety Incrementally with Checked C. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Roberto Zunino Verifying Liquidity of Bitcoin Contracts. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Flemming Nielson, David Sands 0001 (eds.) Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1John D. Ramsdell, Paul D. Rowe, Perry Alexander, Sarah Helble, Peter A. Loscocco, J. Aaron Pendergrass, Adam Petz Orchestrating Layered Attestations. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Natasha Fernandes, Mark Dras, Annabelle McIver Generalised Differential Privacy for Text Document Processing. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1David Butler 0002, David Aspinall 0001, Adrià Gascón On the Formalisation of Σ-Protocols and Commitment Schemes. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexandre Debant, Stéphanie Delaune Symbolic Verification of Distance Bounding Protocols. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon Oddershede Gregersen, Søren Eller Thomsen, Aslan Askarov A Dependently Typed Library for Static Information-Flow Control in Idris. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marco Vassena, Gary Soeller, Peter Amidon, Matthew Chan, John Renner, Deian Stefan Foundations for Parallel Information Flow Control Runtime Systems. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tachio Terauchi, Timos Antonopoulos A Formal Analysis of Timing Channel Security via Bucketing. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aseem Rastogi, Nikhil Swamy, Michael Hicks 0001 Wys*: A DSL for Verified Secure Multi-party Computations. Search on Bibsonomy POST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino SoK: Unraveling Bitcoin Smart Contracts. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta Transcompiling Firewalls. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Yusuke Kawamoto 0001, Catuscia Palamidessi Leakage and Protocol Composition in a Game-Theoretic Perspective. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Barbara Kordy, Wojciech Widel On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Panagiotis Vasilikos, Flemming Nielson, Hanne Riis Nielson Secure Information Release in Timed Automata. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anastasia Mavridou, Aron Laszka Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ilya Grishchenko, Matteo Maffei, Clara Schneidewind A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks 0001, Stephen Magill What's the Over/Under? Probabilistic Bounds on Information Leakage. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov, Lars Birkedal Compositional Non-interference for Concurrent Programs via Separation and Framing. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lujo Bauer, Ralf Küsters (eds.) Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò 0001 Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arthur Azevedo de Amorim, Catalin Hritcu, Benjamin C. Pierce The Meaning of Memory Safety. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg 0001 UniTraX: Protecting Data Privacy with Discoverable Biases. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei Equivalence Properties by Typing in Cryptographic Branching Protocols. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels. Search on Bibsonomy POST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kushal Babel, Vincent Cheval, Steve Kremer On Communication Models When Verifying Equivalence Properties. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sergiu Bursuc, Christian Johansen, Shiwei Xu Automated Verification of Dynamic Root of Trust Protocols. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zaruhi Aslanyan, Flemming Nielson Model Checking Exact Cost for Attack Scenarios. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli A Survey of Attacks on Ethereum Smart Contracts (SoK). Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arthur Blot, Masaki Yamamoto 0004, Tachio Terauchi Compositional Synthesis of Leakage Resilient Programs. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld A Principled Approach to Tracking Information Flow in the Presence of Libraries. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pablo Cañones, Boris Köpf, Jan Reineke 0001 Security Analysis of Cache Replacement Policies. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matteo Maffei, Mark Ryan 0001 (eds.) Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrick Ah-Fat, Michael Huth 0001 Secure Multi-party Computation: Information Flow of Outputs and Game Theory. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ridha Khédri, Owain Jones, Mohammed Alabbad Defense in Depth Formulation and Usage in Dynamic Access Control. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Limin Jia 0001, Lujo Bauer Timing-Sensitive Noninterference through Composition. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marcos Cramer, Giovanni Casini Postulates for Revocation Schemes. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Pettai, Peeter Laud Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Piotr Mardziel, Michael W. Hicks Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. Search on Bibsonomy POST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Schmitz 0001, Dustin Rhodes, Thomas H. Austin, Kenneth L. Knowles, Cormac Flanagan Faceted Dynamic Information Flow via Control and Data Monads. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kevin Falzon, Eric Bodden Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Holger Hermanns, Julia Krämer, Jan Krcál, Mariëlle Stoelinga The Value of Attack-Defence Diagrams. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nataliia Bielova, Tamara Rezk A Taxonomy of Information Flow Monitors. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianxiong Shao, Yu Qin, Dengguo Feng Computational Soundness Results for Stateful Applied π Calculus. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Iulia Bolosteanu, Deepak Garg 0001 Asymmetric Secure Multi-execution with Declassification. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joachim Breitner, Jürgen Graf 0001, Martin Hecker 0001, Martin Mohr, Gregor Snelting On Improvements of Low-Deterministic Security. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Quoc Huy Do 0002, Eduard Kamburjan, Nathan Wasser Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka Correct Audit Logging: Theory and Practice. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jürgen Graf 0001, Martin Hecker 0001, Martin Mohr, Gregor Snelting Tool Demonstration: JOANA. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim, Alessandro Bruni AIF-ω: Set-Based Protocol Abstraction with Countable Families. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Antoine Dallon, Stéphanie Delaune Bounding the Number of Agents, for Equivalence Too. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan 0001 Composing Protocols with Randomized Actions. Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank Piessens, Luca Viganò 0001 (eds.) Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings Search on Bibsonomy POST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Fabian Bendun, Jörg Hoffmann 0001, Ninja Marnau PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tom Chothia, Ben Smyth, Christopher Staite Automatically Checking Commitment Protocols in ProVerif without False Attacks. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling Type-Based Verification of Electronic Voting Protocols. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sibylle B. Fröschle Leakiness is Decidable for Well-Founded Protocols. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Catuscia Palamidessi Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Sasa Radomirovic Generalizing Multi-party Contract Signing. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone Analysis of XACML Policies with SMT. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thanh Binh Nguyen 0003, Christoph Sprenger 0001 Abstractions for Security Protocol Verification. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riccardo Focardi, Andrew C. Myers (eds.) Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bart van Delft, Sebastian Hunt, David Sands 0001 Very Static Enforcement of Dynamic Policies. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kristian Beilke, Volker Roth 0002 A Safe Update Mechanism for Smart Cards. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adam Petcher, Greg Morrisett The Foundational Cryptography Framework. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Myrto Arapinis, Vincent Cheval, Stéphanie Delaune Composing Security Protocols: From Confidentiality to Privacy. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zaruhi Aslanyan, Flemming Nielson Pareto Efficient Solutions of Attack-Defence Trees. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vincent Cheval, Véronique Cortier Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Robert Künnemann Automated Backward Analysis of PKCS#11 v2.20. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martín Abadi, Michael Isard On the Flow of Data, Information, and Time. Search on Bibsonomy POST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Esfandiar Mohammadi, Tim Ruffing Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Baelde, Stéphanie Delaune, Lucca Hirschi A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Andre Scedrov, Fred B. Schneider When Not All Bits Are Equal: Worth-Based Information Flow. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marion Daubignard, David Lubicz, Graham Steel A Secure Key Management Interface with Asymmetric Cryptography. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf Extending and Applying a Framework for the Cryptographic Verification of Java Programs. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Arnold, Holger Hermanns, Reza Pulungan, Mariëlle Stoelinga Time-Dependent Analysis of Attacks. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rohit Chadha, Dileep Kini, Mahesh Viswanathan 0001 Quantitative Information Flow in Boolean Programs. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Annabelle McIver, Carroll Morgan, Geoffrey Smith 0001, Barbara Espinoza, Larissa Meinicke Abstract Channels and Their Robust Information-Leakage Ordering. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abhishek Bichhawat, Vineet Rajani, Deepak Garg 0001, Christian Hammer 0001 Information Flow Control in WebKit's JavaScript Bytecode. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Manuel Barbosa, David Castro 0003, Paulo F. Silva 0001 Compiling CAO: From Cryptographic Specifications to C Implementations. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin Decentralized Composite Access Control. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martín Abadi, Steve Kremer (eds.) Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Myrto Arapinis, Jia Liu 0003, Eike Ritter, Mark Ryan 0001 Stateful Applied Pi Calculus. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa Leakage Resilience against Concurrent Cache Attacks. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Costanzo, Zhong Shao A Separation Logic for Enforcing Declarative Information Flow Control Policies. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jed Liu, Andrew C. Myers Defining and Enforcing Referential Security. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez 0001 Temporal Logics for Hyperproperties. Search on Bibsonomy POST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson Lazy Mobile Intruders. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Carbone, Joshua D. Guttman Sessions and Separability in Security Protocols. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino A Theory of Agreements and Protection. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rémy Chrétien, Stéphanie Delaune Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thanh Binh Nguyen 0003, Christoph Sprenger 0001 Sound Security Protocol Transformations. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech Formal Verification of e-Auction Protocols. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Cadé, Bruno Blanchet Proved Generation of Implementations from Computationally Secure Protocol Specifications. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David A. Basin, John C. Mitchell (eds.) Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ehab ElSalamouny, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi A Differentially Private Mechanism of Optimal Utility for a Region of Priors. Search on Bibsonomy POST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 129 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license