Search dblp for Publications

export results for "toc:db/conf/csfw/csf2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/BackesHM08,
  author       = {Michael Backes and
                  Catalin Hritcu and
                  Matteo Maffei},
  title        = {Automated Verification of Remote Electronic Voting Protocols in the
                  Applied Pi-Calculus},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {195--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.26},
  doi          = {10.1109/CSF.2008.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesU08,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {Computational Soundness of Symbolic Zero-Knowledge Proofs Against
                  Active Attackers},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {255--269},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.20},
  doi          = {10.1109/CSF.2008.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BandhakaviWW08,
  author       = {Sruthi Bandhakavi and
                  William H. Winsborough and
                  Marianne Winslett},
  title        = {A Trust Management Approach for Flexible Policy Management in Security-Typed
                  Languages},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.22},
  doi          = {10.1109/CSF.2008.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BandhakaviWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheCR08,
  author       = {Gilles Barthe and
                  Salvador Cavadini and
                  Tamara Rezk},
  title        = {Tractable Enforcement of Declassification Policies},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {83--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.11},
  doi          = {10.1109/CSF.2008.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BengtsonBFGM08,
  author       = {Jesper Bengtson and
                  Karthikeyan Bhargavan and
                  C{\'{e}}dric Fournet and
                  Andrew D. Gordon and
                  Sergio Maffeis},
  title        = {Refinement Types for Secure Implementations},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {17--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.27},
  doi          = {10.1109/CSF.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BengtsonBFGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BrunsH08,
  author       = {Glenn Bruns and
                  Michael Huth},
  title        = {Access-Control Policies via Belnap Logic: Effective and Efficient
                  Composition and Analysis},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {163--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.10},
  doi          = {10.1109/CSF.2008.10},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BrunsH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BugliesiF08,
  author       = {Michele Bugliesi and
                  Riccardo Focardi},
  title        = {Language Based Secure Communication},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {3--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.17},
  doi          = {10.1109/CSF.2008.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BugliesiF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChongM08,
  author       = {Stephen Chong and
                  Andrew C. Myers},
  title        = {End-to-End Enforcement of Erasure and Declassification},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {98--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.12},
  doi          = {10.1109/CSF.2008.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChongM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ClarksonS08,
  author       = {Michael R. Clarkson and
                  Fred B. Schneider},
  title        = {Hyperproperties},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {51--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.7},
  doi          = {10.1109/CSF.2008.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ClarksonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DeYoungGP08,
  author       = {Henry DeYoung and
                  Deepak Garg and
                  Frank Pfenning},
  title        = {An Authorization Logic With Explicit Time},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {133--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.15},
  doi          = {10.1109/CSF.2008.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DeYoungGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKR08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Mark Ryan},
  title        = {Composition of Password-Based Protocols},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {239--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.6},
  doi          = {10.1109/CSF.2008.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DelauneKS08,
  author       = {St{\'{e}}phanie Delaune and
                  Steve Kremer and
                  Graham Steel},
  title        = {Formal Analysis of PKCS{\#}11},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {331--344},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.16},
  doi          = {10.1109/CSF.2008.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DelauneKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DillowayL08,
  author       = {Christopher Dilloway and
                  Gavin Lowe},
  title        = {Specifying Secure Transport Channels},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {210--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.14},
  doi          = {10.1109/CSF.2008.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DillowayL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Goubault-Larrecq08,
  author       = {Jean Goubault{-}Larrecq},
  title        = {Towards Producing Formally Checkable Security Proofs, Automatically},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {224--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.21},
  doi          = {10.1109/CSF.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Goubault-Larrecq08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GurevichN08,
  author       = {Yuri Gurevich and
                  Itay Neeman},
  title        = {{DKAL:} Distributed-Knowledge Authorization Language},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {149--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.8},
  doi          = {10.1109/CSF.2008.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GurevichN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KuhlmanMBET08,
  author       = {Doug Kuhlman and
                  Ryan Moriarty and
                  Tony Braskich and
                  Steve Emeott and
                  Mahesh V. Tripunitara},
  title        = {A Correctness Proof of a Mesh Security Architecture},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {315--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.23},
  doi          = {10.1109/CSF.2008.23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/KuhlmanMBET08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KustersT08,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Joint State Theorems for Public-Key Encryption and Digital Signature
                  Functionalities with Local Computation},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {270--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.18},
  doi          = {10.1109/CSF.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KustersT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MeydenZ08,
  author       = {Ron van der Meyden and
                  Chenyi Zhang},
  title        = {Information Flow in Systems with Schedulers},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {301--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.13},
  doi          = {10.1109/CSF.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MeydenZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Miura-KoYMB08,
  author       = {Reiko Ann Miura{-}Ko and
                  Benjamin Yolken and
                  John Mitchell and
                  Nicholas Bambos},
  title        = {Security Decision-Making among Interdependent Organizations},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {66--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.25},
  doi          = {10.1109/CSF.2008.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Miura-KoYMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SprengerB08,
  author       = {Christoph Sprenger and
                  David A. Basin},
  title        = {Cryptographically-Sound Protocol-Model Abstractions},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {115--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.19},
  doi          = {10.1109/CSF.2008.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SprengerB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Terauchi08,
  author       = {Tachio Terauchi},
  title        = {A Type System for Observational Determinism},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {287--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.9},
  doi          = {10.1109/CSF.2008.9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Terauchi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/VaughanJMZ08,
  author       = {Jeffrey A. Vaughan and
                  Limin Jia and
                  Karl Mazurak and
                  Steve Zdancewic},
  title        = {Evidence-Based Audit},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {177--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.24},
  doi          = {10.1109/CSF.2008.24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/VaughanJMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2008,
  title        = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4556666/proceeding},
  isbn         = {978-0-7695-3182-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics