ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2012 IEEE 25th Computer Security Foundations Symposium
Latest Publications
TOTAL DOCUMENTS
34
(FIVE YEARS 0)
H-INDEX
12
(FIVE YEARS 0)
Published By IEEE
9781467319188, 9780769547183
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Title Page i
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.1
◽
2012
◽
Keyword(s):
Title Page
Download Full-text
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.25
◽
2012
◽
Cited By ~ 79
Author(s):
Benedikt Schmidt
◽
Simon Meier
◽
Cas Cremers
◽
David Basin
Keyword(s):
Automated Analysis
◽
Diffie Hellman
◽
Security Properties
Download Full-text
Measuring Information Leakage Using Generalized Gain Functions
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.26
◽
2012
◽
Cited By ~ 92
Author(s):
M'rio S. Alvim
◽
Kostas Chatzikokolakis
◽
Catuscia Palamidessi
◽
Geoffrey Smith
Keyword(s):
Information Leakage
Download Full-text
The Thermodynamics of Confidentiality
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.18
◽
2012
◽
Cited By ~ 2
Author(s):
Pasquale Malacaria
◽
Fabrizio Smeraldi
Download Full-text
Verifying Privacy-Type Properties in a Modular Way
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.16
◽
2012
◽
Cited By ~ 8
Author(s):
Myrto Arapinis
◽
Vincent Cheval
◽
Stephanie Delaune
Download Full-text
Security Analysis of Role-Based Access Control through Program Verification
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.28
◽
2012
◽
Cited By ~ 12
Author(s):
Anna Lisa Ferrara
◽
P. Madhusudan
◽
Gennaro Parlato
Keyword(s):
Access Control
◽
Program Verification
◽
Security Analysis
◽
Role Based Access Control
◽
Role Based
Download Full-text
Secure Compilation to Modern Processors
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.12
◽
2012
◽
Cited By ~ 36
Author(s):
Pieter Agten
◽
Raoul Strackx
◽
Bart Jacobs
◽
Frank Piessens
Download Full-text
Constructing Optimistic Multi-party Contract Signing Protocols
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.23
◽
2012
◽
Cited By ~ 5
Author(s):
Barbara Kordy
◽
Saa Radomirovic
Keyword(s):
Contract Signing
Download Full-text
Information-Flow Control for Programming on Encrypted Data
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.30
◽
2012
◽
Cited By ~ 16
Author(s):
John C. Mitchell
◽
Rahul Sharma
◽
Deian Stefan
◽
Joe Zimmerman
Keyword(s):
Flow Control
◽
Information Flow
◽
Information Flow Control
◽
Encrypted Data
Download Full-text
A Framework for the Cryptographic Verification of Java-Like Programs
2012 IEEE 25th Computer Security Foundations Symposium
◽
10.1109/csf.2012.9
◽
2012
◽
Cited By ~ 19
Author(s):
Ralf Kusters
◽
Tomasz Truderung
◽
Jurgen Graf
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close