


default search action
26th CSF 2013: New Orleans, LA, USA
- 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5031-2
Information Flow 1
- Benoît Montagu
, Benjamin C. Pierce, Randy Pollack:
A Theory of Information-Flow Labels. 3-17 - Dante Zanarini, Mauro Jaskelioff, Alejandro Russo
:
Precise Enforcement of Confidentiality for Reactive Systems. 18-32 - Willard Rafnsson, Andrei Sabelfeld:
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent. 33-48
Language-Based Security
- Chang Liu, Michael Hicks
, Elaine Shi:
Memory Trace Oblivious Program Execution. 51-65 - Jérémy Planul, John C. Mitchell
:
Oblivious Program Execution and Path-Sensitive Non-interference. 66-80 - Matteo Maffei, Kim Pecina, Manuel Reinert:
Security and Privacy by Declarative Design. 81-96 - Pedro Adão
, Riccardo Focardi
, Flaminia L. Luccio
:
Type-Based Analysis of Generic Key Management APIs. 97-111
Access Control
- Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi:
Cryptographically Enforced RBAC. 115-129 - Mingsheng Ying
, Yuan Feng
, Nengkun Yu
:
Quantum Information-Flow Security: Noninterference and Access Control. 130-144 - Timothy L. Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee
, Alessandro Panebianco, Lenore D. Zuck:
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness. 145-160
Quantitative Security
- Michael Backes, Aniket Kate, Praveen Manoharan
, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. 163-178 - Xihui Chen, Gabriele Lenzini, Miguel Martins, Sjouke Mauw
, Jun Pang:
A Trust Framework for Evaluating GNSS Signal Integrity. 179-192 - Tom Chothia, Yusuke Kawamoto
, Chris Novakovic
, David Parker
:
Probabilistic Point-to-Point Information Leakage. 193-205
Information Flow 2
- Martin Lester
, Luke Ong
, Max Schäfer:
Information Flow Analysis for a Dynamically Typed Language with Staged Metaprogramming. 209-223 - Luminous Fennell, Peter Thiemann:
Gradual Security Typing with References. 224-239 - Frédéric Besson, Nataliia Bielova
, Thomas P. Jensen:
Hybrid Information Flow Monitoring against Web Tracking. 240-254
Privacy and Cryptography
- Florian Böhl, Dominique Unruh
:
Symbolic Universal Composability. 257-271 - Fabienne Eigner, Matteo Maffei:
Differential Privacy by Typing in Security Protocols. 272-286 - Gilles Barthe
, George Danezis, Benjamin Grégoire, César Kunz, Santiago Zanella Béguelin
:
Verified Computational Differential Privacy with Applications to Smart Metering. 287-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.