default search action
FAST 2011: Leuven, Belgium
- Gilles Barthe, Anupam Datta, Sandro Etalle:
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7140, Springer 2012, ISBN 978-3-642-29419-8 - Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon, Jan Jürjens:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. 1-20 - Willem De Groef, Dominique Devriese, Frank Piessens:
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation. 21-38 - Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi:
Differential Privacy: On the Trade-Off between Utility and Information Leakage. 39-54 - Luciano Bello, Eduardo Bonelli:
On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow. 55-69 - Barbara Espinoza, Geoffrey Smith:
Min-Entropy Leakage of Channels in Cascade. 70-84 - Riccardo Focardi, Flaminia L. Luccio:
Secure Recharge of Disposable RFID Tickets. 85-99 - Simon N. Foley, Samane Abdi:
Avoiding Delegation Subterfuge Using Linked Local Permission Names. 100-114 - Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl:
Verifiable Control Flow Policies for Java Bytecode. 115-130 - Sibylle B. Fröschle, Nils Sommer:
Concepts and Proofs for Configuring PKCS#11. 131-147 - Richard Gay, Heiko Mantel, Barbara Sprick:
Service Automata. 148-163 - Thomas Gibson-Robinson, Gavin Lowe:
Analysing Applications Layered on Unilaterally Authenticating Protocols. 164-181 - Robert Grabowski, Martin Hofmann, Keqin Li:
Type-Based Enforcement of Secure Programming Guidelines - Code Injection Prevention at SAP. 182-197 - Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, John C. Mitchell:
TBA : A Hybrid of Logic and Extensional Access Control Systems. 198-213 - Sebastian Mödersheim:
Diffie-Hellman without Difficulty. 214-229 - Behnam Sattarzadeh, Mehran S. Fallah:
Is Cryptyc Able to Detect Insider Attacks? 230-244 - Ben Smyth, Mark Ryan, Liqun Chen:
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. 245-262 - Mohammad Torabi Dashti, Jan Cederquist, Yanjing Wang:
Risk Balance in Optimistic Non-repudiation Protocols. 263-277
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.