Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 194 matches
- 2023
- Geraldine Shirley Nicholas, Dhruvakumar Vikas Aklekar, Bhavin Thakar, Fareena Saqib:
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V. Cryptogr. 7(4): 58 (2023) - Drew Zagieboylo, Charles Sherk, Andrew C. Myers, G. Edward Suh:
SpecVerilog: Adapting Information Flow Control for Secure Speculation. CCS 2023: 2068-2082 - Matthias Stammler, Matthias Hamann, Jürgen Becker:
Multilevel Security Model for Secure Information Flow Inside Software Components Employing Automated Code Generation. MECO 2023: 1-6 - Cecilia Manzino, Gonzalo de Latorre:
A Haskell-Embedded DSL for Secure Information-Flow. SBMF 2023: 20-35 - Geraldine Shirley Nicholas, Dhruvakumar Vikas Aklekar, Bhavin Thakar, Fareena Saqib:
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V. CoRR abs/2311.10283 (2023) - 2022
- Jintian Lu, Jiakun Sun, Ruizhi Xiao, Shuyuan Jin:
DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control. Comput. Secur. 117: 102678 (2022) - Chandrika Bhardwaj, Sanjiva Prasad:
Secure information flow connections. J. Log. Algebraic Methods Program. 127: 100761 (2022) - Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni:
Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures. SECRYPT 2022: 499-506 - Sanjiva Prasad, R. Madhukar Yerraguntla, Subodh Sharma:
Secure Information Flow Typing in LUSTRE. CoRR abs/2201.00184 (2022) - 2021
- Patrick Ah-Fat:
Privacy and utility in secure computations: optimal trade-offs through quantitative information flow. Imperial College London, UK, 2021 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Information Flow Control Based on Capability Token Validity for Secure IoT: Implementation and Evaluation. Internet Things 15: 100423 (2021) - Zhiwu Xu, Hongxu Chen, Alwen Tiu, Yang Liu, Kunal Sareen:
A permission-dependent type system for secure information flow analysis. J. Comput. Secur. 29(2): 161-228 (2021) - Amit Goyal, Akshat Garg, Digvijaysingh Gour, R. K. Shyamasundar, G. Sivakumar:
Information Flow Secure CAmkES. IoTBDS 2021: 237-244 - Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil, Snehal Borse, Satyaki Sen:
SP*: An Information Flow Secure Linux. ISPA/BDCloud/SocialCom/SustainCom 2021: 1603-1612 - 2020
- Lauren Pick, Grigory Fedyukovich, Aarti Gupta:
Automating Modular Verification of Secure Information Flow. FMCAD 2020: 158-168 - Jiliang Wang, Feng Hu, Ye Zhou, Yunhao Liu, Hanyi Zhang, Zhe Liu:
BlueDoor: breaking the secure information flow via BLE vulnerability. MobiSys 2020: 286-298 - Chandrika Bhardwaj, Sanjiva Prasad:
Secure Information Flow Connections. CoRR abs/2011.03319 (2020) - 2019
- Anum Khurshid, Abdul Nasir Khan, Fiaz Gul Khan, Mazhar Ali, Junaid Shuja, Atta ur Rehman Khan:
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. Pract. Exp. 31(8) (2019) - Ning Xi, Jing Lv, Cong Sun, Jianfeng Ma:
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 21(8): 753 (2019) - Armaiti Ardeshiricham, Yoshiki Takashima, Sicun Gao, Ryan Kastner:
VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties. CCS 2019: 1623-1638 - Tobias F. Pfeffer, Thomas Göthel, Sabine Glesner:
Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. CODASPY 2019: 197-208 - Zhenghong Jiang, Hanchen Jin, G. Edward Suh, Zhiru Zhang:
Designing Secure Cryptographic Accelerators with Information Flow Enforcement: A Case Study on AES. DAC 2019: 59 - Ali A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh:
Secure Information Flow Analysis Using the PRISM Model Checker. ICISS 2019: 154-172 - Patrick Ah-Fat, Michael Huth:
Scalable Information Flow Analysis of Secure Three-Party Affine Computations. ISIT 2019: 2967-2971 - Abhishek Tiwari, Sascha Groß, Christian Hammer:
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications. SecureComm (2) 2019: 335-349 - Patrick Ah-Fat, Michael Huth:
Scalable Information-Flow Analysis of Secure Three-Party Affine Computations. CoRR abs/1901.00798 (2019) - 2018
- Yu Tai, Wei Hu, Dejun Mu, Baolei Mao, Lu Zhang:
Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design. IEEE Access 6: 1822-1831 (2018) - Shahriar Bijani, David Robertson, David Aspinall:
Secure information sharing in social agent interactions using information flow analysis. Eng. Appl. Artif. Intell. 70: 52-66 (2018) - Weiwei Ding, Jin Wang, Xiumin Wang, Kejie Lu, Ruimin Zhao, Yanqin Zhu:
On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts. Int. J. Commun. Syst. 31(6) (2018) - Kalev Alpernas, Cormac Flanagan, Sadjad Fouladi, Leonid Ryzhyk, Mooly Sagiv, Thomas Schmitz, Keith Winstein:
Secure serverless computing using dynamic information flow control. Proc. ACM Program. Lang. 2(OOPSLA): 118:1-118:26 (2018)
skipping 164 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 10:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint