ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2013 IEEE 26th Computer Security Foundations Symposium
Latest Publications
TOTAL DOCUMENTS
28
(FIVE YEARS 0)
H-INDEX
11
(FIVE YEARS 0)
Published By IEEE
9780769550312
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Precise Enforcement of Confidentiality for Reactive Systems
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.9
◽
2013
◽
Cited By ~ 22
Author(s):
Dante Zanarini
◽
Mauro Jaskelioff
◽
Alejandro Russo
Keyword(s):
Reactive Systems
Download Full-text
Reviewers
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.7
◽
2013
◽
Download Full-text
Oblivious Program Execution and Path-Sensitive Non-interference
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.12
◽
2013
◽
Cited By ~ 2
Author(s):
Jeremy Planul
◽
John C Mitchell
Keyword(s):
Program Execution
Download Full-text
A Theory of Information-Flow Labels
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.8
◽
2013
◽
Cited By ~ 14
Author(s):
Benoit Montagu
◽
Benjamin C. Pierce
◽
Randy Pollack
Keyword(s):
Information Flow
◽
Theory Of Information
Download Full-text
AnoA: A Framework for Analyzing Anonymous Communication Protocols
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.18
◽
2013
◽
Cited By ~ 19
Author(s):
Michael Backes
◽
Aniket Kate
◽
Praveen Manoharan
◽
Sebastian Meiser
◽
Esfandiar Mohammadi
Keyword(s):
Communication Protocols
◽
Anonymous Communication
Download Full-text
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.17
◽
2013
◽
Cited By ~ 8
Author(s):
Timothy L. Hinrichs
◽
Diego Martinoia
◽
William C. Garrison III
◽
Adam J. Lee
◽
Alessandro Panebianco
◽
...
Keyword(s):
Access Control
◽
Control Evaluation
Download Full-text
Probabilistic Point-to-Point Information Leakage
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.20
◽
2013
◽
Cited By ~ 17
Author(s):
Tom Chothia
◽
Yusuke Kawamoto
◽
Chris Novakovic
◽
David Parker
Keyword(s):
Information Leakage
◽
Point To Point
◽
Probabilistic Point
Download Full-text
Author index
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.27
◽
2013
◽
Download Full-text
Gradual Security Typing with References
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.22
◽
2013
◽
Cited By ~ 24
Author(s):
Luminous Fennell
◽
Peter Thiemann
Download Full-text
Quantum Information-Flow Security: Noninterference and Access Control
2013 IEEE 26th Computer Security Foundations Symposium
◽
10.1109/csf.2013.16
◽
2013
◽
Cited By ~ 3
Author(s):
Mingsheng Ying
◽
Yuan Feng
◽
Nengkun Yu
Keyword(s):
Quantum Information
◽
Access Control
◽
Information Flow
◽
Information Flow Security
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close