default search action
22nd CSF 2009: Port Jefferson, NY, USA
- Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3712-2
Protocol Design
- Aaron Johnson, Paul F. Syverson:
More Anonymous Onion Routing Through Trust. 3-12 - Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Dashti:
Minimal Message Complexity of Asynchronous Multi-party Contract Signing. 13-25 - Phillip Rogaway, Till Stegers:
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code. 26-39
Information Flow
- Aslan Askarov, Andrei Sabelfeld:
Tight Enforcement of Information-Release Policies for Dynamic Languages. 43-59 - J. Nathan Foster, Benjamin C. Pierce, Steve Zdancewic:
Updatable Security Views. 60-74
Web Security
- Sergio Maffeis, Ankur Taly:
Language-Based Isolation of Untrusted JavaScript. 77-91 - Alejandro Russo, Andrei Sabelfeld:
Securing Timeout Instructions in Web Applications. 92-106
Protocol Analysis
- Patrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun:
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. 109-123 - Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, James J. Leifer:
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. 124-140 - Christian Cachin, Nishanth Chandran:
A Secure Cryptographic Token Interface. 141-153
Protocols I
- Ralf Küsters, Tomasz Truderung:
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. 157-171 - Sagar Chaki, Anupam Datta:
ASPIER: An Automated Framework for Verifying Security Protocol Implementations. 172-185 - Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov:
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. 186-199
Authorization
- Moritz Y. Becker:
Specification and Analysis of Dynamic Authorisation Policies. 203-217 - Max I. Kanovich, Paul D. Rowe, Andre Scedrov:
Policy Compliance in Collaborative Systems. 218-233 - Chris Hankin, Flemming Nielson, Hanne Riis Nielson:
Advice from Belnap Policies. 234-247
Verification Methods
- Gilberto Filé, Roberto Vigo:
Expressive Power of Definite Clauses for Verifying Authenticity. 251-265 - Véronique Cortier, Stéphanie Delaune:
A Method for Proving Observational Equivalence. 266-276 - Najah Chridi, Mathieu Turuani, Michaël Rusinowitch:
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. 277-289
Protocols II
- Ralf Küsters, Max Tuengerthal:
Universally Composable Symmetric Encryption. 293-307 - Michael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei:
Achieving Security Despite Compromise Using Zero-knowledge. 308-323 - Boris Köpf, Markus Dürmuth:
A Provably Secure and Efficient Countermeasure against Timing Attacks. 324-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.