Login / Signup
FOSAD
2000
2006
2010
2016
2000
2016
Keyphrases
Publications
2016
Ankur Taly
,
Asim Shankar
Distributed Authorization in Vanadium.
FOSAD
(2016)
Jonathan Bootle
,
Andrea Cerulli
,
Pyrros Chaidos
,
Jens Groth
Efficient Zero-Knowledge Proof Systems.
FOSAD
(2016)
Steven Van Acker
,
Andrei Sabelfeld
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript.
FOSAD
(2016)
Michael Backes
,
Pascal Berrang
,
Praveen Manoharan
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
FOSAD
(2016)
volume 9808, 2016
Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures
FOSAD
9808 (2016)
volume 8604, 2014
Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures
FOSAD
8604 (2014)
2013
Jens Bürger
,
Jan Jürjens
,
Thomas Ruhroth
,
Stefan Gärtner
,
Kurt Schneider
Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models.
FOSAD
(2013)
Karthikeyan Bhargavan
,
Antoine Delignat-Lavaud
,
Sergio Maffeis
Defensive JavaScript - Building and Verifying Secure Web Components.
FOSAD
(2013)
David Bernhard
,
Bogdan Warinschi
Cryptographic Voting - A Gentle Introduction.
FOSAD
(2013)
Gilles Barthe
,
François Dupressoir
,
Benjamin Grégoire
,
César Kunz
,
Benedikt Schmidt
,
Pierre-Yves Strub
EasyCrypt: A Tutorial.
FOSAD
(2013)
Fabrice Bouquet
,
Fabien Peureux
,
Fabrice Ambert
Model-Based Testing for Functional and Security Test Generation.
FOSAD
(2013)
Sabrina De Capitani di Vimercati
,
Robert F. Erbacher
,
Sara Foresti
,
Sushil Jajodia
,
Giovanni Livraga
,
Pierangela Samarati
Encryption and Fragmentation for Data Confidentiality in the Cloud.
FOSAD
(2013)
Bruno Blanchet
Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.
FOSAD
(2013)
Willem De Groef
,
Dominique Devriese
,
Mathy Vanhoef
,
Frank Piessens
Information Flow Control for Web Scripts.
FOSAD
(2013)
Ruben Rios
,
Javier López
,
Jorge Cuéllar
Location Privacy in WSNs: Solutions, Challenges, and Future Trends.
FOSAD
(2013)
2011
Daniele Micciancio
The Geometry of Lattice Cryptography.
FOSAD
(2011)
Cédric Fournet
,
Karthikeyan Bhargavan
,
Andrew D. Gordon
Cryptographic Verification by Typing for a Sample Protocol Implementation.
FOSAD
(2011)
David A. Basin
,
Manuel Clavel
,
Marina Egea
,
Miguel Angel García de Dios
,
Carolina Dania
,
Gonzalo Ortiz
,
Javier Valdazo
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications.
FOSAD
(2011)
Riccardo Focardi
,
Flaminia L. Luccio
,
Graham Steel
An Introduction to Security API Analysis.
FOSAD
(2011)
Yudistira Asnar
,
Fabio Massacci
A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach.
FOSAD
(2011)
Mário S. Alvim
,
Miguel E. Andrés
,
Konstantinos Chatzikokolakis
,
Catuscia Palamidessi
Quantitative Information Flow and Applications to Differential Privacy.
FOSAD
(2011)
Roberto Gorrieri
,
Matteo Vernali
On Intransitive Non-interference in Some Models of Concurrency.
FOSAD
(2011)
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Giovanni Livraga
,
Pierangela Samarati
Protecting Privacy in Data Release.
FOSAD
(2011)
Mass Soldal Lund
,
Bjørnar Solhaug
,
Ketil Stølen
Risk Analysis of Changing and Evolving Systems Using CORAS.
FOSAD
(2011)
volume 6858, 2011
Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures
FOSAD
6858 (2011)