default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2016
- Xi Wu, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton:
A Methodology for Formalizing Model-Inversion Attacks. CSF 2016: 355-370 - Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio:
Localizing Firewall Security Policies. CSF 2016: 194-209 - Shreya Agrawal, Borzoo Bonakdarpour:
Runtime Verification of k-Safety Hyperproperties in HyperLTL. CSF 2016: 239-252 - Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
Axioms for Information Leakage. CSF 2016: 77-92 - Ross J. Anderson:
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). CSF 2016: 16 - Andrew W. Appel:
Modular Verification for Computer Security. CSF 2016: 1-8 - Owen Arden, Andrew C. Myers:
A Calculus for Flow-Limited Authorization. CSF 2016: 135-149 - Zaruhi Aslanyan, Flemming Nielson, David Parker:
Quantitative Verification and Synthesis of Attack-Defence Scenarios. CSF 2016: 105-119 - Mounir Assaf, David A. Naumann:
Calculational Design of Information Flow Monitors. CSF 2016: 210-224 - David A. Basin, Søren Debois, Thomas T. Hildebrandt:
In the Nick of Time: Proactive Prevention of Obligation Violations. CSF 2016: 120-134 - David A. Basin, Sasa Radomirovic, Lara Schmid:
Modeling Human Errors in Security Protocols. CSF 2016: 325-340 - Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Hybrid Monitoring of Attacker Knowledge. CSF 2016: 225-238 - Bruno Blanchet, Ben Smyth:
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. CSF 2016: 310-324 - Jeremiah Blocki, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. CSF 2016: 371-386 - Nicolás E. Bordenabe, Geoffrey Smith:
Correlated Secrets in Quantitative Information Flow. CSF 2016: 93-104 - Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei:
Micro-policies for Web Session Security. CSF 2016: 179-193 - Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi:
Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems. CSF 2016: 458-470 - Katriel Cohn-Gordon, Cas Cremers, Luke Garratt:
On Post-compromise Security. CSF 2016: 164-178 - Sergiu Costea, Bogdan Warinschi:
Secure Software Licensing: Models, Constructions, and Proofs. CSF 2016: 31-44 - Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker:
Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete. CSF 2016: 432-442 - Úlfar Erlingsson:
Data-Driven Software Security: Models and Methods. CSF 2016: 9-15 - Cédric Fournet, Chantal Keller, Vincent Laporte:
A Certified Compiler for Verifiable Computing. CSF 2016: 268-280 - Simon Greiner, Daniel Grahl:
Non-interference with What-Declassification in Component-Based Systems. CSF 2016: 253-267 - Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce:
Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. CSF 2016: 45-60 - M. H. R. Khouzani, Pasquale Malacaria:
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. CSF 2016: 61-76 - Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. CSF 2016: 341-354 - Toby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah:
Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. CSF 2016: 417-431 - Corina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria:
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. CSF 2016: 387-400 - Marco Patrignani, Dominique Devriese, Frank Piessens:
On Modular and Fully-Abstract Compilation. CSF 2016: 17-30 - Vineet Rajani, Deepak Garg, Tamara Rezk:
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. CSF 2016: 150-163
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-02 15:46 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint