Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Andrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks 0001 |
Achieving Safety Incrementally with Checked C. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Massimo Bartoletti, Roberto Zunino |
Verifying Liquidity of Bitcoin Contracts. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Flemming Nielson, David Sands 0001 (eds.) |
Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | John D. Ramsdell, Paul D. Rowe, Perry Alexander, Sarah Helble, Peter A. Loscocco, J. Aaron Pendergrass, Adam Petz |
Orchestrating Layered Attestations. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Natasha Fernandes, Mark Dras, Annabelle McIver |
Generalised Differential Privacy for Text Document Processing. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | David Butler 0002, David Aspinall 0001, Adrià Gascón |
On the Formalisation of Σ-Protocols and Commitment Schemes. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Debant, Stéphanie Delaune |
Symbolic Verification of Distance Bounding Protocols. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon Oddershede Gregersen, Søren Eller Thomsen, Aslan Askarov |
A Dependently Typed Library for Static Information-Flow Control in Idris. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Marco Vassena, Gary Soeller, Peter Amidon, Matthew Chan, John Renner, Deian Stefan |
Foundations for Parallel Information Flow Control Runtime Systems. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Tachio Terauchi, Timos Antonopoulos |
A Formal Analysis of Timing Channel Security via Bucketing. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aseem Rastogi, Nikhil Swamy, Michael Hicks 0001 |
Wys*: A DSL for Verified Secure Multi-party Computations. |
POST |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino |
SoK: Unraveling Bitcoin Smart Contracts. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta |
Transcompiling Firewalls. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Yusuke Kawamoto 0001, Catuscia Palamidessi |
Leakage and Protocol Composition in a Game-Theoretic Perspective. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Kordy, Wojciech Widel |
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Panagiotis Vasilikos, Flemming Nielson, Hanne Riis Nielson |
Secure Information Release in Timed Automata. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Anastasia Mavridou, Aron Laszka |
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ilya Grishchenko, Matteo Maffei, Clara Schneidewind |
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks 0001, Stephen Magill |
What's the Over/Under? Probabilistic Bounds on Information Leakage. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov, Lars Birkedal |
Compositional Non-interference for Concurrent Programs via Separation and Framing. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer, Ralf Küsters (eds.) |
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò 0001 |
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Azevedo de Amorim, Catalin Hritcu, Benjamin C. Pierce |
The Meaning of Memory Safety. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg 0001 |
UniTraX: Protecting Data Privacy with Discoverable Biases. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei |
Equivalence Properties by Typing in Cryptographic Branching Protocols. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam |
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels. |
POST |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kushal Babel, Vincent Cheval, Steve Kremer |
On Communication Models When Verifying Equivalence Properties. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sergiu Bursuc, Christian Johansen, Shiwei Xu |
Automated Verification of Dynamic Root of Trust Protocols. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zaruhi Aslanyan, Flemming Nielson |
Model Checking Exact Cost for Attack Scenarios. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli |
A Survey of Attacks on Ethereum Smart Contracts (SoK). |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Blot, Masaki Yamamoto 0004, Tachio Terauchi |
Compositional Synthesis of Leakage Resilient Programs. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld |
A Principled Approach to Tracking Information Flow in the Presence of Libraries. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Cañones, Boris Köpf, Jan Reineke 0001 |
Security Analysis of Cache Replacement Policies. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Maffei, Mark Ryan 0001 (eds.) |
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Ah-Fat, Michael Huth 0001 |
Secure Multi-party Computation: Information Flow of Outputs and Game Theory. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse |
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ridha Khédri, Owain Jones, Mohammed Alabbad |
Defense in Depth Formulation and Usage in Dynamic Access Control. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Willard Rafnsson, Limin Jia 0001, Lujo Bauer |
Timing-Sensitive Noninterference through Composition. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Cramer, Giovanni Casini |
Postulates for Revocation Schemes. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Pettai, Peeter Laud |
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Piotr Mardziel, Michael W. Hicks |
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. |
POST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Schmitz 0001, Dustin Rhodes, Thomas H. Austin, Kenneth L. Knowles, Cormac Flanagan |
Faceted Dynamic Information Flow via Control and Data Monads. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Falzon, Eric Bodden |
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Holger Hermanns, Julia Krämer, Jan Krcál, Mariëlle Stoelinga |
The Value of Attack-Defence Diagrams. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nataliia Bielova, Tamara Rezk |
A Taxonomy of Information Flow Monitors. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Computational Soundness Results for Stateful Applied π Calculus. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Iulia Bolosteanu, Deepak Garg 0001 |
Asymmetric Secure Multi-execution with Declassification. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Breitner, Jürgen Graf 0001, Martin Hecker 0001, Martin Mohr, Gregor Snelting |
On Improvements of Low-Deterministic Security. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Quoc Huy Do 0002, Eduard Kamburjan, Nathan Wasser |
Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka |
Correct Audit Logging: Theory and Practice. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jürgen Graf 0001, Martin Hecker 0001, Martin Mohr, Gregor Snelting |
Tool Demonstration: JOANA. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Alessandro Bruni |
AIF-ω: Set-Based Protocol Abstraction with Countable Families. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Antoine Dallon, Stéphanie Delaune |
Bounding the Number of Agents, for Equivalence Too. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan 0001 |
Composing Protocols with Randomized Actions. |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Frank Piessens, Luca Viganò 0001 (eds.) |
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings |
POST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Fabian Bendun, Jörg Hoffmann 0001, Ninja Marnau |
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tom Chothia, Ben Smyth, Christopher Staite |
Automatically Checking Commitment Protocols in ProVerif without False Attacks. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling |
Type-Based Verification of Electronic Voting Protocols. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sibylle B. Fröschle |
Leakiness is Decidable for Well-Founded Protocols. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Catuscia Palamidessi |
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sjouke Mauw, Sasa Radomirovic |
Generalizing Multi-party Contract Signing. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone |
Analysis of XACML Policies with SMT. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Binh Nguyen 0003, Christoph Sprenger 0001 |
Abstractions for Security Protocol Verification. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Focardi, Andrew C. Myers (eds.) |
Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bart van Delft, Sebastian Hunt, David Sands 0001 |
Very Static Enforcement of Dynamic Policies. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo |
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Beilke, Volker Roth 0002 |
A Safe Update Mechanism for Smart Cards. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adam Petcher, Greg Morrisett |
The Foundational Cryptography Framework. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Myrto Arapinis, Vincent Cheval, Stéphanie Delaune |
Composing Security Protocols: From Confidentiality to Privacy. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zaruhi Aslanyan, Flemming Nielson |
Pareto Efficient Solutions of Attack-Defence Trees. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Cheval, Véronique Cortier |
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Robert Künnemann |
Automated Backward Analysis of PKCS#11 v2.20. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Michael Isard |
On the Flow of Data, Information, and Time. |
POST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Esfandiar Mohammadi, Tim Ruffing |
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Baelde, Stéphanie Delaune, Lucca Hirschi |
A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mário S. Alvim, Andre Scedrov, Fred B. Schneider |
When Not All Bits Are Equal: Worth-Based Information Flow. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marion Daubignard, David Lubicz, Graham Steel |
A Secure Key Management Interface with Asymmetric Cryptography. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf |
Extending and Applying a Framework for the Cryptographic Verification of Java Programs. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Arnold, Holger Hermanns, Reza Pulungan, Mariëlle Stoelinga |
Time-Dependent Analysis of Attacks. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rohit Chadha, Dileep Kini, Mahesh Viswanathan 0001 |
Quantitative Information Flow in Boolean Programs. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Annabelle McIver, Carroll Morgan, Geoffrey Smith 0001, Barbara Espinoza, Larissa Meinicke |
Abstract Channels and Their Robust Information-Leakage Ordering. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Bichhawat, Vineet Rajani, Deepak Garg 0001, Christian Hammer 0001 |
Information Flow Control in WebKit's JavaScript Bytecode. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Barbosa, David Castro 0003, Paulo F. Silva 0001 |
Compiling CAO: From Cryptographic Specifications to C Implementations. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin |
Decentralized Composite Access Control. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martín Abadi, Steve Kremer (eds.) |
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Myrto Arapinis, Jia Liu 0003, Eike Ritter, Mark Ryan 0001 |
Stateful Applied Pi Calculus. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa |
Leakage Resilience against Concurrent Cache Attacks. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Costanzo, Zhong Shao |
A Separation Logic for Enforcing Declarative Information Flow Control Policies. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jed Liu, Andrew C. Myers |
Defining and Enforcing Referential Security. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez 0001 |
Temporal Logics for Hyperproperties. |
POST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson |
Lazy Mobile Intruders. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Carbone, Joshua D. Guttman |
Sessions and Separability in Security Protocols. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino |
A Theory of Agreements and Protection. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rémy Chrétien, Stéphanie Delaune |
Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Binh Nguyen 0003, Christoph Sprenger 0001 |
Sound Security Protocol Transformations. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Dreier, Pascal Lafourcade 0001, Yassine Lakhnech |
Formal Verification of e-Auction Protocols. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Cadé, Bruno Blanchet |
Proved Generation of Implementations from Computationally Secure Protocol Specifications. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David A. Basin, John C. Mitchell (eds.) |
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings |
POST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ehab ElSalamouny, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi |
A Differentially Private Mechanism of Optimal Utility for a Region of Priors. |
POST |
2013 |
DBLP DOI BibTeX RDF |
|