Search dblp for Publications

export results for "toc:db/conf/csfw/csf2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/AbadiEGMMPTZ17,
  author       = {Mart{\'{\i}}n Abadi and
                  {\'{U}}lfar Erlingsson and
                  Ian J. Goodfellow and
                  H. Brendan McMahan and
                  Ilya Mironov and
                  Nicolas Papernot and
                  Kunal Talwar and
                  Li Zhang},
  title        = {On the Protection of Private Information in Machine Learning Systems:
                  Two Recent Approches},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.10},
  doi          = {10.1109/CSF.2017.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AbadiEGMMPTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesGMS17,
  author       = {Michael Backes and
                  Manuel Gomez{-}Rodriguez and
                  Praveen Manoharan and
                  Bartlomiej Surma},
  title        = {Reconciling Privacy and Utility in Continuous-Time Diffusion Networks},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {292--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.29},
  doi          = {10.1109/CSF.2017.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesGMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaeldeDGK17,
  author       = {David Baelde and
                  St{\'{e}}phanie Delaune and
                  Ivan Gazeau and
                  Steve Kremer},
  title        = {Symbolic Verification of Privacy-Type Properties for Security Protocols
                  with {XOR}},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {234--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.22},
  doi          = {10.1109/CSF.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BaeldeDGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaoSWKVB17,
  author       = {Tiffany Bao and
                  Yan Shoshitaishvili and
                  Ruoyu Wang and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  David Brumley},
  title        = {How Shall We Play a Game?: {A} Game-theoretical Model for Cyber-warfare
                  Games},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {7--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.34},
  doi          = {10.1109/CSF.2017.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BaoSWKVB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheBLPT17,
  author       = {Gilles Barthe and
                  Sandrine Blazy and
                  Vincent Laporte and
                  David Pichardie and
                  Alix Trieu},
  title        = {Verified Translation Validation of Static Analyses},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {405--419},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.16},
  doi          = {10.1109/CSF.2017.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheBLPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Blanchet17,
  author       = {Bruno Blanchet},
  title        = {Symbolic and Computational Mechanized Verification of the {ARINC823}
                  Avionic Protocols},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {68--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.7},
  doi          = {10.1109/CSF.2017.7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Blanchet17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BoldyrevaCDP17,
  author       = {Alexandra Boldyreva and
                  Shan Chen and
                  Pierre{-}Alain Dupont and
                  David Pointcheval},
  title        = {Human Computing for Handling Strong Corruptions in Authenticated Key
                  Exchange},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {159--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.31},
  doi          = {10.1109/CSF.2017.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BoldyrevaCDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CalzavaraGKM17,
  author       = {Stefano Calzavara and
                  Ilya Grishchenko and
                  Adrien Koutsos and
                  Matteo Maffei},
  title        = {A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of
                  Android Applications},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {22--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.19},
  doi          = {10.1109/CSF.2017.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CalzavaraGKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CamenischLNS17,
  author       = {Jan Camenisch and
                  Anja Lehmann and
                  Gregory Neven and
                  Kai Samelin},
  title        = {UC-Secure Non-interactive Public-Key Encryption},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {217--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.14},
  doi          = {10.1109/CSF.2017.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CamenischLNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CanettiHMV17,
  author       = {Ran Canetti and
                  Kyle Hogan and
                  Aanchal Malhotra and
                  Mayank Varia},
  title        = {A Universally Composable Treatment of Network Time},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {360--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.38},
  doi          = {10.1109/CSF.2017.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CanettiHMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCW17,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  title        = {Secure Composition of PKIs with Public Key Protocols},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {144--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.28},
  doi          = {10.1109/CSF.2017.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ComonK17,
  author       = {Hubert Comon and
                  Adrien Koutsos},
  title        = {Formal Computational Unlinkability Proofs of {RFID} Protocols},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {100--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.9},
  doi          = {10.1109/CSF.2017.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ComonK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CortierDD17,
  author       = {V{\'{e}}ronique Cortier and
                  Antoine Dallon and
                  St{\'{e}}phanie Delaune},
  title        = {SAT-Equiv: An Efficient Tool for Equivalence Properties},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {481--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.15},
  doi          = {10.1109/CSF.2017.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CortierDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DOsualdoOT17,
  author       = {Emanuele D'Osualdo and
                  Luke Ong and
                  Alwen Tiu},
  title        = {Deciding Secrecy of Security Protocols for an Unbounded Number of
                  Sessions: The Case of Depth-Bounded Processes},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {464--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.32},
  doi          = {10.1109/CSF.2017.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DOsualdoOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR17,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Ludovic Robin},
  title        = {Formal Verification of Protocols Based on Short Authenticated Strings},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {130--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.26},
  doi          = {10.1109/CSF.2017.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FettKS17,
  author       = {Daniel Fett and
                  Ralf K{\"{u}}sters and
                  Guido Schmitz},
  title        = {The Web {SSO} Standard OpenID Connect: In-depth Formal Security Analysis
                  and Security Guidelines},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {189--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.20},
  doi          = {10.1109/CSF.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FettKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FocardiS17,
  author       = {Riccardo Focardi and
                  Marco Squarcina},
  title        = {Run-Time Attack Detection in Cryptographic APIs},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {176--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.33},
  doi          = {10.1109/CSF.2017.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FocardiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GazeauCD17,
  author       = {Ivan Gazeau and
                  Tom Chothia and
                  Dominic Duggan},
  title        = {Types for Location and Data Security in Cloud Environments},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {376--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.25},
  doi          = {10.1109/CSF.2017.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GazeauCD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GuarnieriMB17,
  author       = {Marco Guarnieri and
                  Srdjan Marinovic and
                  David A. Basin},
  title        = {Securing Databases from Probabilistic Inference},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {343--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.30},
  doi          = {10.1109/CSF.2017.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GuarnieriMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HallgrenOS17,
  author       = {Per A. Hallgren and
                  Claudio Orlandi and
                  Andrei Sabelfeld},
  title        = {PrivatePool: Privacy-Preserving Ridesharing},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {276--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.24},
  doi          = {10.1109/CSF.2017.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HallgrenOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HessM17,
  author       = {Andreas Viktor Hess and
                  Sebastian M{\"{o}}dersheim},
  title        = {Formalizing and Proving a Typing Result for Security Protocols in
                  Isabelle/HOL},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {451--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.27},
  doi          = {10.1109/CSF.2017.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HessM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KhouzaniM17,
  author       = {M. H. R. Khouzani and
                  Pasquale Malacaria},
  title        = {Leakage-Minimal Design: Universality, Limitations, and Applications},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {305--317},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.40},
  doi          = {10.1109/CSF.2017.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KhouzaniM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KwonHE17,
  author       = {Hyoukjun Kwon and
                  William Harris and
                  Hadi Esmaeilzadeh},
  title        = {Proving Flow Security of Sequential Logic via Automatically-Synthesized
                  Relational Invariants},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {420--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.35},
  doi          = {10.1109/CSF.2017.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KwonHE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LanotteMMV17,
  author       = {Ruggero Lanotte and
                  Massimo Merro and
                  Riccardo Muradore and
                  Luca Vigan{\`{o}}},
  title        = {A Formal Approach to Cyber-Physical Attacks},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {436--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.12},
  doi          = {10.1109/CSF.2017.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LanotteMMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiZ17,
  author       = {Peixuan Li and
                  Danfeng Zhang},
  title        = {Towards a Flow- and Path-Sensitive Information Flow Analysis},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {53--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.17},
  doi          = {10.1109/CSF.2017.17},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MilnerCYR17,
  author       = {Kevin Milner and
                  Cas Cremers and
                  Jiangshan Yu and
                  Mark Ryan},
  title        = {Automatically Detecting the Misuse of Secrets: Foundations, Design
                  Principles, and Applications},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {203--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.21},
  doi          = {10.1109/CSF.2017.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MilnerCYR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Mironov17,
  author       = {Ilya Mironov},
  title        = {R{\'{e}}nyi Differential Privacy},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {263--275},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.11},
  doi          = {10.1109/CSF.2017.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Mironov17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PassS17,
  author       = {Rafael Pass and
                  Elaine Shi},
  title        = {Rethinking Large-Scale Consensus},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {115--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.37},
  doi          = {10.1109/CSF.2017.37},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/PassS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PatrignaniG17,
  author       = {Marco Patrignani and
                  Deepak Garg},
  title        = {Secure Compilation and Hyperproperty Preservation},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {392--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.13},
  doi          = {10.1109/CSF.2017.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PatrignaniG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/PhanBPMB17,
  author       = {Quoc{-}Sang Phan and
                  Lucas Bang and
                  Corina S. Pasareanu and
                  Pasquale Malacaria and
                  Tevfik Bultan},
  title        = {Synthesis of Adaptive Side-Channel Attacks},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {328--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.8},
  doi          = {10.1109/CSF.2017.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/PhanBPMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SmithS17,
  author       = {David M. Smith and
                  Geoffrey Smith},
  title        = {Tight Bounds on Information Leakage from Repeated Independent Runs},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {318--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.18},
  doi          = {10.1109/CSF.2017.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SmithS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/StoughtonV17,
  author       = {Alley Stoughton and
                  Mayank Varia},
  title        = {Mechanizing the Proof of Adaptive, Information-Theoretic Security
                  of Cryptographic Protocols in the Random Oracle Model},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {83--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.36},
  doi          = {10.1109/CSF.2017.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/StoughtonV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VassenaBR17,
  author       = {Marco Vassena and
                  Joachim Breitner and
                  Alejandro Russo},
  title        = {Securing Concurrent Lazy Programs Against Information Leakage},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {37--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.39},
  doi          = {10.1109/CSF.2017.39},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/VassenaBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ZhouY17,
  author       = {Li Zhou and
                  Mingsheng Ying},
  title        = {Differential Privacy in Quantum Computation},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {249--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.23},
  doi          = {10.1109/CSF.2017.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ZhouY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics