default search action
37th CSF 2024: Enschede, Netherlands
- 37th IEEE Computer Security Foundations Symposium, CSF 2024, Enschede, Netherlands, July 8-12, 2024. IEEE 2024, ISBN 979-8-3503-6203-9
- Fortunat Rajaona, Ioana Boureanu, R. Ramanujam, Stephan Wesemeyer:
Epistemic Model Checking for Privacy. 1-16 - Elena Andreeva, Rishiraj Bhattacharyya, Arnab Roy, Stefano Trevisani:
On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing. 1-16 - Sergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with Relaxed Isolation Requirements. 1-16 - R. Ramanujam, Vaishnavi Sundararajan, S. P. Suresh:
Solving the Insecurity Problem for Assertions. 1-15 - Karima Makhlouf, Tamara Stefanovic, Héber Hwang Arcolezi, Catuscia Palamidessi:
A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results. 1-16 - Laouen Fernet, Sebastian Mödersheim, Luca Viganò:
A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of Transitions. 17-32 - Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Divide and Funnel: A Scaling Technique for Mix-Networks. 49-64 - Nabarun Deka, Minjian Zhang, Rohit Chadha, Mahesh Viswanathan:
Deciding Branching Hyperproperties for Real Time Systems. 65-79 - Ugo Dal Lago, Davide Davoli, Bruce M. Kapron:
On Separation Logic, Computational Independence, and Pseudorandomness. 80-95 - Atalay Mert Ileri, Nickolai Zeldovich, Adam Chlipala, M. Frans Kaashoek:
Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism. 96-111 - Alfredo Capozucca, Maximiliano Cristiá, Ross Horne, Ricardo Katz:
Brewer-Nash Scrutinised: Mechanised Checking of Policies Featuring Write Revocation. 112-126 - Francesco D'Amato, Luca Zanolini:
Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience. 127-142 - Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. 143-158 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Modeling Mobile Crash in Byzantine Consensus. 159-171 - Wenhui Qiao, Liang Feng Zhang:
A Maintainable Matrix Commitment Scheme with Constant-Size Public Parameters and Incremental Aggregation. 172-185 - Véronique Cortier, Pierrick Gaudry, Quentin Yang:
Is the JCJ voting system really coercion-resistant? 186-200 - Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach:
Accountable Bulletin Boards: Definition and Provably Secure Implementation. 201-216 - Prashant Agrawal, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:
Publicly Auditable Privacy-Preserving Electoral Rolls. 217-232 - Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:
Bridging the Gap: Automated Analysis of Sancus. 233-248 - Markus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Magdalena Solitro, Matteo Maffei:
Wappler: Sound Reachability Analysis for WebAssembly. 249-264 - Robert Künnemann, Marco Patrignani, Ethan Cecchetti:
Computationally Bounded Robust Compilation and Universally Composable Security. 265-278 - Bruno Blanchet, Pierre Boutry, Christian Doczkal, Benjamin Grégoire, Pierre-Yves Strub:
CV2EC: Getting the Best of Both Worlds. 279-294 - Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. 311-323 - David Baelde, Caroline Fontaine, Adrien Koutsos, Guillaume Scerri, Théo Vignon:
A Probabilistic Logic for Concrete Security. 324-339 - Matvey Soloviev, Musard Balliu, Roberto Guanciale:
Security Properties through the Lens of Modal Logic. 340-355 - Aaron D. Jaggard, Paul Syverson, Catherine Meadows:
A Logic of Sattestation. 356-371 - Dan Bogdanov, Joosep Jääger, Peeter Laud, Härmel Nestra, Martin Pettai, Jaak Randmets, Raul-Martin Rebane, Ville Sokk, Kert Tali, Sandhra-Mirella Valdma:
ZK-SecreC: a Domain-Specific Language for Zero-Knowledge Proofs. 372-387 - Amir M. Ahmadian, Matvey Soloviev, Musard Balliu:
Disjunctive Policies for Database-Backed Programs. 388-402 - Brijesh Dongol, Matt Griffin, Andrei Popescu, Jamie Wright:
Relative Security: Formally Modeling and (Dis)Proving Resilience Against Semantic Optimization Vulnerabilities. 403-418 - Natasha Fernandes, Annabelle McIver, Parastoo Sadeghi:
Explaining ∊ in Local Differential Privacy Through the Lens of Quantitative Information Flow. 419-432 - Cosku Acay, Joshua Gancher, Rolph Recto, Andrew C. Myers:
Secure Synthesis of Distributed Cryptographic Applications. 433-448 - Lisa Oakley, Steven Holtzen, Alina Oprea:
Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting. 449-463 - Barbara Fila, Sasa Radomirovic:
Nothing is Out-of-Band: Formal Modeling of Ceremonies. 464-478 - Bruno Blanchet:
Dealing with Dynamic Key Compromise in Crypto Verif. 495-510 - Katharina Kreuzer:
Verification of Correctness and Security Properties for CRYSTALS-KYBER. 511-526 - Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig:
Circuit-Succinct Universally-Composable NIZKs with Updatable CRS. 527-542 - Bruno Blanchet, Charlie Jacomme:
Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-Exchanges. 543-556 - Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally Secure MPC for Boolean Circuits With Constant Online Communication. 557-572 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling:
UniHand: Privacy-Preserving Universal Handover for Small-Cell Networks in 5G-Enabled Mobile Communication with KCI Resilience. 573-588 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. 589-604 - Azucena Garvía Bosshard, Jonathan Bootle, Christoph Sprenger:
Formal Verification of the Sumcheck Protocol. 605-619 - Dennis Dayanikli, Anja Lehmann:
Provable Security Analysis of the Secure Remote Password Protocol. 620-635 - Zoltán Ádám Mann:
Urgency in Cybersecurity Risk Management: Toward a Solid Theory. 651-664 - Milan Lopuhaä-Zwakenberg:
Attack Tree Metrics are Operad Algebras. 665-679 - Patricia Guerra-Balboa, Àlex Miranda-Pascual, Javier Parra-Arnau, Thorsten Strufe:
Composition in Differential Privacy for General Granularity Notions. 680-696
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.