2012 IEEE 25th Computer Security Foundations Symposium (CSF) : 25 - 27 June 2012, Cambridge, Massachusetts, USA ; [proceedings] (English)
- New search for: Institute of Electrical and Electronics Engineers
- Further information on Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
- New search for: Institute of Electrical and Electronics Engineers
- Further information on Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
2012
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:2012 IEEE 25th Computer Security Foundations Symposium (CSF) : 25 - 27 June 2012, Cambridge, Massachusetts, USA ; [proceedings]
-
Contributors:
-
Conference:IEEE Computer Security Foundations Symposium ; 25 ; 2012 ; Cambridge, Mass.
CSF ; 25 ; 2012 ; Cambridge, Mass. -
Publisher:
- New search for: IEEE
-
Place of publication:Piscataway, NJ
-
Publication date:2012
-
Size:Online-Ressource
-
Remarks:graph. Darst.
Literaturangaben -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information-Flow Security for a Core of JavaScriptHedin, Daniel / Sabelfeld, Andrei et al. | 2012
- 19
-
Secure Information Flow for Concurrent Programs under Total Store OrderVaughan, Jeffrey A. / Millstein, Todd et al. | 2012
- 30
-
ENCoVer: Symbolic Exploration for Information Flow SecurityBalliu, Musard / Dam, Mads / Guernic, Gurvan Le et al. | 2012
- 45
-
Information-Flow Control for Programming on Encrypted DataMitchell, John C. / Sharma, Rahul / Stefan, Deian / Zimmerman, Joe et al. | 2012
- 63
-
Symbolic Analysis of Cryptographic Protocols Containing Bilinear PairingsPankova, Alisa / Laud, Peeter et al. | 2012
- 78
-
Automated Analysis of Diffie-Hellman Protocols and Advanced Security PropertiesSchmidt, Benedikt / Meier, Simon / Cremers, Cas / Basin, David et al. | 2012
- 95
-
Verifying Privacy-Type Properties in a Modular WayArapinis, Myrto / Cheval, Vincent / Delaune, Stephanie et al. | 2012
- 113
-
Security Analysis of Role-Based Access Control through Program VerificationFerrara, Anna Lisa / Madhusudan, P. / Parlato, Gennaro et al. | 2012
- 126
-
Gran: Model Checking Grsecurity RBAC PoliciesBugliesi, Michele / Calzavara, Stefano / Focardi, Riccardo / Squarcina, Marco et al. | 2012
- 139
-
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and AbductionGenovese, Valerio / Garg, Deepak / Rispoli, Daniele et al. | 2012
- 157
-
Mashic Compiler: Mashup Sandboxing Based on Inter-frame CommunicationLuo, Zhengqin / Rezk, Tamara et al. | 2012
- 171
-
Secure Compilation to Modern ProcessorsAgten, Pieter / Strackx, Raoul / Jacobs, Bart / Piessens, Frank et al. | 2012
- 186
-
Cache-Leakage Resilient OS Isolation in an Idealized Model of VirtualizationBarthe, Gilles / Betarte, Gustavo / Campo, Juan Diego / Luna, Carlos et al. | 2012
- 198
-
A Framework for the Cryptographic Verification of Java-Like ProgramsKusters, Ralf / Truderung, Tomasz / Graf, Jurgen et al. | 2012
- 215
-
Constructing Optimistic Multi-party Contract Signing ProtocolsKordy, Barbara / Radomirovic, Saa et al. | 2012
- 230
-
Refining Key EstablishmentSprenger, Christoph / Basin, David et al. | 2012
- 247
-
Discovering Concrete Attacks on Website Authorization by Formal AnalysisBansal, Chetan / Bhargavan, Karthikeyan / Maffeis, Sergio et al. | 2012
- 265
-
Measuring Information Leakage Using Generalized Gain FunctionsAlvim, M'rio S. / Chatzikokolakis, Kostas / Palamidessi, Catuscia / Smith, Geoffrey et al. | 2012
- 280
-
The Thermodynamics of ConfidentialityMalacaria, Pasquale / Smeraldi, Fabrizio et al. | 2012
- 293
-
Securing Interactive ProgramsRafnsson, Willard / Hedin, Daniel / Sabelfeld, Andrei et al. | 2012
- 308
-
Learning is Change in Knowledge: Knowledge-Based Security for Dynamic PoliciesAskarov, Aslan / Chong, Stephen et al. | 2012
- 325
-
Automatically Verified Mechanized Proof of One-Encryption Key ExchangeBlanchet, Bruno et al. | 2012
- 340
-
Generic Indifferentiability Proofs of Hash DesignsDaubignard, Marion / Fouque, Pierre-Alain / Lakhnech, Yassine et al. | 2012
- 354
-
Verified Security of Merkle-DamgårdBackes, Michael / Barthe, Gilles / Berg, Matthias / Gregoire, Benjamin / Kunz, Cesar / Skoruppa, Malte / Beguelin, Santiago Zanella et al. | 2012
- 369
-
Provably Secure and Practical Onion RoutingBackes, Michael / Goldberg, Ian / Kate, Aniket / Mohammadi, Esfandiar et al. | 2012
- 387
-
Author Index| 2012
- 388
-
Publisher's Information| 2012
- i
-
Title Page i| 2012
- iii
-
Title Page iii| 2012
- iv
-
Copyright Page| 2012
- ix
-
Committees| 2012
- v
-
Table of Contents| 2012
- viii
-
Preface| 2012
- xi
-
External Reviewers| 2012