default search action
24th CSF 2011: Cernay-la-Ville, France
- Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011. IEEE Computer Society 2011, ISBN 978-1-61284-644-6
Security Protocol Verification I
- François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. 3-17 - Simone Frau, Mohammad Torabi Dashti:
Integrated Specification and Verification of Security Protocols and Policies. 18-32 - Myrto Arapinis, Eike Ritter, Mark Dermot Ryan:
StatVerif: Verification of Stateful Processes. 33-47
Security Protocol Verification II
- Long Ngo, Colin Boyd, Juanma González Nieto:
Automated Proofs for Diffie-Hellman-Based Key Exchanges. 51-65 - Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel:
Formal Analysis of Protocols Based on TPM State Registers. 66-80
Authorization and Security Policies
- Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei:
Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols. 83-98 - David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. 99-113 - Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa:
Dynamic Enforcement of Knowledge-Based Security Policies. 114-128
Language-Based Security
- Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin G. Zorn:
Modular Protections against Non-control Data Attacks. 131-145 - Scott Moore, Stephen Chong:
Static Analysis for Efficient Hybrid Information-Flow Control. 146-160 - Radha Jagadeesan, Corin Pitcher, Julian Rathke, James Riely:
Local Memory via Layout Randomization. 161-174
Information Flow
- Tom Chothia, Apratim Guha:
A Statistical Test for Information Leaks Using Continuous Mutual Information. 177-190 - Gilles Barthe, Boris Köpf:
Information-Theoretic Bounds for Differentially Private Mechanisms. 191-204 - Pavol Cerný, Krishnendu Chatterjee, Thomas A. Henzinger:
The Complexity of Quantitative Information Flow Problems. 205-217 - Heiko Mantel, David Sands, Henning Sudbrock:
Assumptions and Guarantees for Compositional Noninterference. 218-232
Security Notions and Specifications
- Thomas Groß, Sebastian Mödersheim:
Vertical Protocol Composition. 235-250 - Dominique Unruh:
Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness). 251-265 - Steve Kremer, Graham Steel, Bogdan Warinschi:
Security for Key Management Interfaces. 266-280 - James Cheney:
A Formal Framework for Provenance Security. 281-293
Privacy and Anonymity
- Véronique Cortier, Ben Smyth:
Attacking and Fixing Helios: An Analysis of Ballot Secrecy. 297-311 - Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. 312-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.