


default search action
26th CSF 2013: New Orleans, LA, USA
- 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5031-2

Information Flow 1
- Benoît Montagu

, Benjamin C. Pierce, Randy Pollack:
A Theory of Information-Flow Labels. 3-17 - Dante Zanarini, Mauro Jaskelioff, Alejandro Russo

:
Precise Enforcement of Confidentiality for Reactive Systems. 18-32 - Willard Rafnsson, Andrei Sabelfeld:

Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent. 33-48
Language-Based Security
- Chang Liu, Michael Hicks

, Elaine Shi:
Memory Trace Oblivious Program Execution. 51-65 - Jérémy Planul, John C. Mitchell

:
Oblivious Program Execution and Path-Sensitive Non-interference. 66-80 - Matteo Maffei, Kim Pecina, Manuel Reinert:

Security and Privacy by Declarative Design. 81-96 - Pedro Adão

, Riccardo Focardi
, Flaminia L. Luccio
:
Type-Based Analysis of Generic Key Management APIs. 97-111
Access Control
- Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi:

Cryptographically Enforced RBAC. 115-129 - Mingsheng Ying

, Yuan Feng
, Nengkun Yu
:
Quantum Information-Flow Security: Noninterference and Access Control. 130-144 - Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee

, Alessandro Panebianco, Lenore D. Zuck:
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness. 145-160
Quantitative Security
- Michael Backes, Aniket Kate, Praveen Manoharan

, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. 163-178 - Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw

, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. 179-192 - Tom Chothia, Yusuke Kawamoto

, Chris Novakovic
, David Parker
:
Probabilistic Point-to-Point Information Leakage. 193-205
Information Flow 2
- Martin Lester

, Luke Ong
, Max Schäfer:
Information Flow Analysis for a Dynamically Typed Language with Staged Metaprogramming. 209-223 - Luminous Fennell, Peter Thiemann:

Gradual Security Typing with References. 224-239 - Frédéric Besson, Nataliia Bielova

, Thomas P. Jensen:
Hybrid Information Flow Monitoring against Web Tracking. 240-254
Privacy and Cryptography
- Florian Böhl, Dominique Unruh

:
Symbolic Universal Composability. 257-271 - Fabienne Eigner, Matteo Maffei:

Differential Privacy by Typing in Security Protocols. 272-286 - Gilles Barthe

, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella-Béguelin
:
Verified Computational Differential Privacy with Applications to Smart Metering. 287-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














