


default search action
27th CSF 2014: Vienna, Austria
- IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4290-9

Software Security
- Christos Dimoulas

, Scott Moore, Aslan Askarov, Stephen Chong:
Declarative Policies for Capability Control. 3-17 - Joshua A. Kroll, Gordon Stewart, Andrew W. Appel

:
Portable Software Fault Isolation. 18-32 - Radha Jagadeesan, C. M. Lubinski, Corin Pitcher, James Riely

, Charles Winebrinner
:
Certificates for Verifiable Forensics. 33-47 - Andrey Chudnov, George Kuan, David A. Naumann

:
Information Flow Monitoring as Abstract Interpretation for Relational Logic. 48-62
Information Flow I
- Pablo Buiras, Deian Stefan, Alejandro Russo

:
On Dynamic Flow-Sensitive Floating-Label Systems. 65-79 - Heiko Mantel, Matthias Perner, Jens Sauer:

Noninterference under Weak Memory Models. 80-94
Usable Security
- Marian Harbach, Sascha Fahl, Matthew Smith

:
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. 97-110 - Jens Grossklags, David Reitter:

How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing. 111-122
Cryptography I
- Jason Crampton, Alexandre Pinto:

Attribute-Based Encryption for Access Control Using Elementary Operations. 125-139 - Alex J. Malozemoff, Jonathan Katz, Matthew D. Green:

Automated Analysis and Synthesis of Block-Cipher Modes of Operation. 140-152 - Joseph A. Akinyele, Gilles Barthe

, Benjamin Grégoire, Benedikt Schmidt, Pierre-Yves Strub:
Certified Synthesis of Efficient Batch Verifiers. 153-165
Cryptography II
- Chris Culnane

, Steve A. Schneider
:
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems. 169-183 - Dan Bogdanov

, Peeter Laud
, Sven Laur, Pille Pullonen
:
From Input Private to Universally Composable Secure Multi-party Computation Primitives. 184-198 - Melissa Chase, Markulf Kohlweiss

, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. 199-213
Protocol Verification
- Daniel J. Dougherty, Joshua D. Guttman

:
Decidability for Lightweight Diffie-Hellman Protocols. 217-231 - Moses D. Liskov, F. Javier Thayer:

Modeling Diffie-Hellman Derivability for Automated Analysis. 232-243 - David A. Basin, Cas Cremers, Marko Horvat:

Actor Key Compromise: Consequences and Countermeasures. 244-258 - Sebastian Mödersheim

, Georgios Katsoris:
A Sound Abstraction of the Parsing Problem. 259-273
Information Flow II
- Willard Rafnsson, Andrei Sabelfeld:

Compositional Information-Flow Security for Interactive Systems. 277-292 - Mathy Vanhoef

, Willem De Groef, Dominique Devriese
, Frank Piessens, Tamara Rezk:
Stateful Declassification Policies for Event-Driven Programs. 293-307 - Mário S. Alvim

, Konstantinos Chatzikokolakis, Annabelle McIver
, Carroll Morgan, Catuscia Palamidessi
, Geoffrey Smith:
Additive and Multiplicative Notions of Leakage, and Their Capacities. 308-322
Network Security
- Benjamin Johnson, Aron Laszka

, Jens Grossklags:
The Complexity of Estimating Systematic Risk in Networks. 325-336 - Roberto Vigo, Flemming Nielson

, Hanne Riis Nielson
:
Automated Generation of Attack Trees. 337-350 - Pedro Adão

, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi
, Flaminia L. Luccio
:
Mignis: A Semantic Based Tool for Firewall Configuration. 351-365 - Michele Bugliesi

, Stefano Calzavara
, Riccardo Focardi
, Wilayat Khan, Mauro Tempesta:
Provably Sound Browser-Based Enforcement of Web Session Integrity. 366-380
Privacy I
- Michael Backes, Praveen Manoharan

, Esfandiar Mohammadi:
TUC: Time-Sensitive and Modular Analysis of Anonymous Communication. 383-397 - Justin Hsu

, Marco Gaboardi
, Andreas Haeberlen
, Sanjeev Khanna, Arjun Narayan, Benjamin C. Pierce, Aaron Roth
:
Differential Privacy: An Economic Method for Choosing Epsilon. 398-410 - Gilles Barthe

, Marco Gaboardi
, Emilio Jesús Gallego Arias, Justin Hsu
, César Kunz, Pierre-Yves Strub:
Proving Differential Privacy in Hoare Logic. 411-424
Privacy II
- Jia Liu

, Mark Dermot Ryan
, Liqun Chen
:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. 427-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














