Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage (Englisch)
- Neue Suche nach: Blanchet, Bruno
- Neue Suche nach: Chaudhuri, Avik
- Neue Suche nach: Blanchet, Bruno
- Neue Suche nach: Chaudhuri, Avik
In:
2008 IEEE Symposium on Security and Privacy (sp 2008)
;
417-431
;
2008
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
-
Beteiligte:Blanchet, Bruno ( Autor:in ) / Chaudhuri, Avik ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.05.2008
-
Format / Umfang:329688 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
SybilLimit: A Near-Optimal Social Network Defense against Sybil AttacksYu, Haifeng / Gibbons, Phillip B. / Kaminsky, Michael / Xiao, Feng et al. | 2008
- 18
-
Anonymous Networking with Minimum Latency in Multihop NetworksVenkitasubramaniam, Parvathinathan / Tong, Lang et al. | 2008
- 35
-
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP ConversationsWright, Charles V. / Ballard, Lucas / Coull, Scott E. / Monrose, Fabian / Masson, Gerald M. et al. | 2008
- 50
-
Preserving Caller Anonymity in Voice-over-IP NetworksSrivatsa, Mudhakar / Liu, Ling / Iyengar, Arun et al. | 2008
- 64
-
Jamming-resistant Key Establishment using Uncoordinated Frequency HoppingStrasser, Mario / Pöpper, Christina / Capkun, Srdjan / Cagalj, Mario et al. | 2008
- 81
-
Casting out Demons: Sanitizing Training Data for Anomaly SensorsCretu, Gabriela F. / Stavrou, Angelos / Locasto, Michael E. / Stolfo, Salvatore J. / Keromytis, Angelos D. et al. | 2008
- 96
-
Efficient and Robust TCP Stream NormalizationVutukuru, Mythili / Balakrishnan, Hari / Paxson, Vern et al. | 2008
- 111
-
Robust De-anonymization of Large Sparse DatasetsNarayanan, Arvind / Shmatikov, Vitaly et al. | 2008
- 129
-
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesHalperin, Daniel / Heydt-Benjamin, Thomas S. / Ransford, Benjamin / Clark, Shane S. / Defend, Benessa / Morgan, Will / Fu, Kevin / Kohno, Tadayoshi / Maisel, William H. et al. | 2008
- 143
-
Automatic Patch-Based Exploit Generation is Possible: Techniques and ImplicationsBrumley, David / Poosankam, Pongsin / Song, Dawn / Zheng, Jiang et al. | 2008
- 158
-
Compromising Reflections-or-How to Read LCD Monitors around the CornerBackes, Michael / Dürmuth, Markus / Unruh, Dominique et al. | 2008
- 170
-
ClearShot: Eavesdropping on Keyboard Input from VideoBalzarotti, Davide / Cova, Marco / Vigna, Giovanni et al. | 2008
- 187
-
XFA: Faster Signature Matching with Extended AutomataSmith, Randy / Estan, Cristian / Jha, Somesh et al. | 2008
- 202
-
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation ProtocolBackes, Michael / Maffei, Matteo / Unruh, Dominique et al. | 2008
- 216
-
Towards Practical Privacy for Genomic ComputationJha, Somesh / Kruger, Louis / Shmatikov, Vitaly et al. | 2008
- 233
-
Lares: An Architecture for Secure Active Monitoring Using VirtualizationPayne, Bryan D. / Carbone, Martim / Sharif, Monirul / Lee, Wenke et al. | 2008
- 248
-
Practical Proactive Integrity Preservation: A Basis for Malware DefenseSun, Weiqing / Sekar, R. / Poothia, Gaurav / Karandikar, Tejas et al. | 2008
- 263
-
Preventing Memory Error Exploits with WITAkritidis, Periklis / Cadar, Cristian / Raiciu, Costin / Costa, Manuel / Castro, Miguel et al. | 2008
- 281
-
Thinking Inside the Box: System-Level Failures of Tamper ProofingDrimer, Saar / Murdoch, Steven J. / Anderson, Ross et al. | 2008
- 296
-
Cloaker: Hardware Supported Rootkit ConcealmentDavid, Francis M. / Chan, Ellick M. / Carlyle, Jeffrey C. / Campbell, Roy H. et al. | 2008
- 311
-
Predictable Design of Network-Based Covert Communication SystemsSmith, Ronald William / Knight, George Scott et al. | 2008
- 325
-
Verifying the Safety of User Pointer DereferencesBugrara, Suhabe / Aiken, Alex et al. | 2008
- 339
-
Expressive Declassification Policies and Modular Static EnforcementBanerjee, Anindya / Naumann, David A. / Rosenberg, Stan et al. | 2008
- 354
-
Civitas: Toward a Secure Voting SystemClarkson, Michael R. / Chong, Stephen / Myers, Andrew C. et al. | 2008
- 369
-
Fable: A Language for Enforcing User-defined Security PoliciesSwamy, Nikhil / Corcoran, Brian J. / Hicks, Michael et al. | 2008
- 387
-
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web ApplicationsBalzarotti, Davide / Cova, Marco / Felmetsger, Vika / Jovanovic, Nenad / Kirda, Engin / Kruegel, Christopher / Vigna, Giovanni et al. | 2008
- 402
-
Secure Web Browsing with the OP Web BrowserGrier, Chris / Tang, Shuo / King, Samuel T. et al. | 2008
- 417
-
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted StorageBlanchet, Bruno / Chaudhuri, Avik et al. | 2008
- 432
-
Author index| 2008
- 434
-
Roster Page| 2008
- C1
-
Cover Art| 2008
- i
-
Title Page i| 2008
- iii
-
Title Page iii| 2008
- iv
-
Copyright Page| 2008
- v
-
Table of Contents| 2008
- viii
-
Message from the General Chair| 2008
- x
-
Message from the Program Chairs| 2008
- xi
-
External Reviewers| 2008