Sign in
CSFW
1988
1994
2000
2006
1988
2006
Keyphrases
Publications
2006
Nikhil Swamy
,
Michael Hicks
,
Stephen Tse
,
Steve Zdancewic
Managing Policy Updates in Security-Typed Languages.
CSFW
(2006)
Michael J. May
,
Carl A. Gunter
,
Insup Lee
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies.
CSFW
(2006)
Stéphanie Delaune
,
Steve Kremer
,
Mark Ryan
Coercion-Resistance and Receipt-Freeness in Electronic Voting.
CSFW
(2006)
Riccardo Pucella
,
Fred B. Schneider
Independence From Obfuscation: A Semantic Framework for Dive.
CSFW
(2006)
Jason Crampton
,
Keith M. Martin
,
Peter R. Wild
On Key Assignment for Hierarchical Access Control.
CSFW
(2006)
Kevin R. O'Neill
,
Michael R. Clarkson
,
Stephen Chong
Information-Flow Security for Interactive Programs.
CSFW
(2006)
Peng Li
,
Steve Zdancewic
Encoding Information Flow in Haskell.
CSFW
(2006)
Stephen Chong
,
Andrew C. Myers
Decentralized Robustness.
CSFW
(2006)
19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy
CSFW
(2006)
Alejandro Russo
,
Andrei Sabelfeld
Securing Interaction between Threads and the Scheduler.
CSFW
(2006)
Daniel Hedin
,
David Sands
Noninterference in the Presence of Non-Opaque Pointers.
CSFW
(2006)
Shai Rubin
,
Somesh Jha
,
Barton P. Miller
On the Completeness of Attack Mutation Algorithms.
CSFW
(2006)
Amit Sasturkar
,
Ping Yang
,
Scott D. Stoller
,
C. R. Ramakrishnan
Policy Analysis for Administrative Role Based Access Control.
CSFW
(2006)
Deepak Garg
,
Frank Pfenning
Non-Interference in Constructive Authorization Logic.
CSFW
(2006)
Antonio Lain
,
Miranda Mowbray
Distributed Authorization Using Delegation with Acyclic Paths.
CSFW
(2006)
Marieke Huisman
,
Pratik Worah
,
Kim Sunesen
A Temporal Logic Characterisation of Observational Determinism.
CSFW
(2006)
Kim-Kwang Raymond Choo
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.
CSFW
(2006)
Hongbin Zhou
,
Simon N. Foley
A Framework for Establishing Decentralized Secure Coalitions.
CSFW
(2006)
Ralf Küsters
Simulation-Based Security with Inexhaustible Interactive Turing Machines.
CSFW
(2006)
Karthikeyan Bhargavan
,
Cédric Fournet
,
Andrew D. Gordon
,
Stephen Tse
Verified Interoperable Implementations of Security Protocols.
CSFW
(2006)
Anupam Datta
,
Ante Derek
,
John C. Mitchell
,
Bogdan Warinschi
Computationally Sound Compositional Logic for Key Exchange Protocols.
CSFW
(2006)
Massimo Bartoletti
,
Pierpaolo Degano
,
Gian Luigi Ferrari
Types and Effects for Secure Service Orchestration.
CSFW
(2006)
Krishnendu Chatterjee
,
Radha Jagadeesan
,
Corin Pitcher
Games for Controls.
CSFW
(2006)
Aybek Mukhamedov
,
Mark Dermot Ryan
Resolve-Impossibility for a Contract-Signing Protocol.
CSFW
(2006)
Avik Chaudhuri
,
Martín Abadi
Secrecy by Typing and File-Access Control.
CSFW
(2006)
Christoph Sprenger
,
Michael Backes
,
David A. Basin
,
Birgit Pfitzmann
,
Michael Waidner
Cryptographically Sound Theorem Proving.
CSFW
(2006)
2005
Frédéric Cuppens
,
Nora Cuppens-Boulahia
,
Thierry Sans
Nomad: A Security Model with Non Atomic Actions and Deadlines.
CSFW
(2005)
Massimo Bartoletti
,
Pierpaolo Degano
,
Gian Luigi Ferrari
Enforcing Secure Service Composition.
CSFW
(2005)
Dennis Hofheinz
,
Jörn Müller-Quade
,
Dominique Unruh
Polynomial Runtime in Simulatability Definitions.
CSFW
(2005)
Lantian Zheng
,
Andrew C. Myers
End-to-End Availability Policies and Noninterference.
CSFW
(2005)
Stephen Chong
,
Andrew C. Myers
Language-Based Information Erasure.
CSFW
(2005)
William L. Harrison
,
James Hook
Achieving Information Flow Security through Precise Control of Effects.
CSFW
(2005)
Peng Li
,
Steve Zdancewic
Practical Information-flow Control in Web-Based Information Systems.
CSFW
(2005)
Michael Backes
,
Markus Dürmuth
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
CSFW
(2005)
Martín Abadi
,
Véronique Cortier
Deciding Knowledge in Security Protocols under (Many More) Equational Theories.
CSFW
(2005)
Iliano Cervesato
,
Catherine A. Meadows
,
Dusko Pavlovic
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
CSFW
(2005)
Xavier Allamigeon
,
Bruno Blanchet
Reconstruction of Attacks against Cryptographic Protocols.
CSFW
(2005)
Rob Delicata
,
Steve A. Schneider
Temporal Rank Functions for Forward Secrecy.
CSFW
(2005)
Tian Zhao
,
John Tang Boyland
Type Annotations to Improve Stack-Based Access Control.
CSFW
(2005)
Ajay Mahimkar
,
Vitaly Shmatikov
Game-Based Analysis of Denial-of-Service Prevention Protocols.
CSFW
(2005)
18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France
CSFW
(2005)
Ana Almeida Matos
,
Gérard Boudol
On Declassification and the Non-Disclosure Policy.
CSFW
(2005)
Committees.
CSFW
(2005)
Michael Backes
,
Anupam Datta
,
Ante Derek
,
John C. Mitchell
,
Mathieu Turuani
Compositional Analysis of Contract Signing Protocols.
CSFW
(2005)
Pedro Adão
,
Gergei Bana
,
Andre Scedrov
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption.
CSFW
(2005)
Michael R. Clarkson
,
Andrew C. Myers
,
Fred B. Schneider
Belief in Information Flow.
CSFW
(2005)
Preface.
CSFW
(2005)
Michele Bugliesi
,
Riccardo Focardi
,
Matteo Maffei
Analysis of Typed Analyses of Authentication Protocols.
CSFW
(2005)
Andrei Sabelfeld
,
David Sands
Dimensions and Principles of Declassification.
CSFW
(2005)
2004
Stéphanie Delaune
,
Florent Jacquemard
A Theory of Dictionary Attacks and its Complexity.
CSFW
(2004)