Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/csfw2018.bht:"
@inproceedings{DBLP:conf/csfw/0008SZ18, author = {Christian M{\"{u}}ller and Helmut Seidl and Eugen Zalinescu}, title = {Inductive Invariants for Noninterference in Multi-agent Workflows}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {247--261}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00025}, doi = {10.1109/CSF.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/0008SZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AlmeidaBB0PP18, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Hugo Pacheco and Vitor Pereira and Bernardo Portela}, title = {Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing {MPC} Frameworks}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {132--146}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00017}, doi = {10.1109/CSF.2018.00017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AlmeidaBB0PP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Alvim0PP18, author = {M{\'{a}}rio S. Alvim and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Anna Pazii}, title = {Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {262--267}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00026}, doi = {10.1109/CSF.2018.00026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Alvim0PP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AudinotPK18, author = {Maxime Audinot and Sophie Pinchinat and Barbara Kordy}, title = {Guided Design of Attack Trees: {A} System-Based Approach}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {61--75}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00012}, doi = {10.1109/CSF.2018.00012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AudinotPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Baritel-RuetDFG18, author = {C{\'{e}}cile Baritel{-}Ruet and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire}, title = {Formal Security Proof of {CMAC} and Its Variants}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {91--104}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00014}, doi = {10.1109/CSF.2018.00014}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Baritel-RuetDFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheGL18, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Vincent Laporte}, title = {Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic "Constant-Time"}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {328--343}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00031}, doi = {10.1109/CSF.2018.00031}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BartheGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BasinRS18, author = {David A. Basin and Sasa Radomirovic and Lara Schmid}, title = {Alethea: {A} Provably Secure Random Sample Voting Protocol}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {283--297}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00028}, doi = {10.1109/CSF.2018.00028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BasinRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Blanchet18, author = {Bruno Blanchet}, title = {Composition Theorems for CryptoVerif and Application to {TLS} 1.3}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {16--30}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00009}, doi = {10.1109/CSF.2018.00009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Blanchet18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BonakdarpourF18, author = {Borzoo Bonakdarpour and Bernd Finkbeiner}, title = {The Complexity of Monitoring Hyperproperties}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {162--174}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00019}, doi = {10.1109/CSF.2018.00019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BonakdarpourF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChenTXL18, author = {Hongxu Chen and Alwen Tiu and Zhiwu Xu and Yang Liu}, title = {A Permission-Dependent Type System for Secure Information Flow Analysis}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {218--232}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00023}, doi = {10.1109/CSF.2018.00023}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChenTXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCT18, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Mathieu Turuani}, title = {A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {344--358}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00032}, doi = {10.1109/CSF.2018.00032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChudnovN18, author = {Andrey Chudnov and David A. Naumann}, title = {Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {189--203}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00021}, doi = {10.1109/CSF.2018.00021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChudnovN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CortierDDW18, author = {V{\'{e}}ronique Cortier and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Bogdan Warinschi}, title = {Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {298--312}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00029}, doi = {10.1109/CSF.2018.00029}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CortierDDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DreierHRS18, author = {Jannik Dreier and Lucca Hirschi and Sasa Radomirovic and Ralf Sasse}, title = {Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive {OR}}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {359--373}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00033}, doi = {10.1109/CSF.2018.00033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DreierHRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/EugsterMP18, author = {Patrick Eugster and Giorgia Azzurra Marson and Bertram Poettering}, title = {A Cryptographic Look at Multi-party Channels}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {31--45}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00010}, doi = {10.1109/CSF.2018.00010}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/EugsterMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FischlinJM18, author = {Marc Fischlin and Christian Janson and Sogol Mazaheri}, title = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {105--118}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00015}, doi = {10.1109/CSF.2018.00015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FischlinJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FischlinM18, author = {Marc Fischlin and Sogol Mazaheri}, title = {Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {76--90}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00013}, doi = {10.1109/CSF.2018.00013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FischlinM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HaaghKOSS18, author = {Helene Haagh and Aleksandr Karbyshev and Sabine Oechsner and Bas Spitters and Pierre{-}Yves Strub}, title = {Computer-Aided Proofs for Multiparty Computation with Active Security}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {119--131}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00016}, doi = {10.1109/CSF.2018.00016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HaaghKOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HessM18, author = {Andreas V. Hess and Sebastian M{\"{o}}dersheim}, title = {A Typing Result for Stateful Protocols}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {374--388}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00034}, doi = {10.1109/CSF.2018.00034}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HessM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HildenbrandtSRZ18, author = {Everett Hildenbrandt and Manasvi Saxena and Nishant Rodrigues and Xiaoran Zhu and Philip Daian and Dwight Guth and Brandon M. Moore and Daejun Park and Yi Zhang and Andrei Stefanescu and Grigore Rosu}, title = {{KEVM:} {A} Complete Formal Semantics of the Ethereum Virtual Machine}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {204--217}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00022}, doi = {10.1109/CSF.2018.00022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HildenbrandtSRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JacommeK18, author = {Charlie Jacomme and Steve Kremer}, title = {An Extensive Formal Analysis of Multi-factor Authentication Protocols}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {1--15}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00008}, doi = {10.1109/CSF.2018.00008}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JacommeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LebedevHD18, author = {Ilia Lebedev and Kyle Hogan and Srinivas Devadas}, title = {Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {46--60}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00011}, doi = {10.1109/CSF.2018.00011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LebedevHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiM18, author = {Baiyu Li and Daniele Micciancio}, title = {Symbolic Security of Garbled Circuits}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {147--161}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00018}, doi = {10.1109/CSF.2018.00018}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MalacariaKPPL18, author = {Pasquale Malacaria and M. H. R. Khouzani and Corina S. Pasareanu and Quoc{-}Sang Phan and Kasper S{\o}e Luckow}, title = {Symbolic Side-Channel Analysis for Probabilistic Programs}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {313--327}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00030}, doi = {10.1109/CSF.2018.00030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MalacariaKPPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/McCallZJ18, author = {McKenna McCall and Hengrun Zhang and Limin Jia}, title = {Knowledge-Based Security of Dynamic Secrets for Reactive Programs}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {175--188}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00020}, doi = {10.1109/CSF.2018.00020}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/McCallZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Rajani018, author = {Vineet Rajani and Deepak Garg}, title = {Types for Information Flow Control: Labeling Granularity and Semantic Models}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {233--246}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00024}, doi = {10.1109/CSF.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Rajani018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/YeomGFJ18, author = {Samuel Yeom and Irene Giacomelli and Matt Fredrikson and Somesh Jha}, title = {Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {268--282}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00027}, doi = {10.1109/CSF.2018.00027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/YeomGFJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2018, title = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8428826/proceeding}, isbn = {978-1-5386-6680-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.