


default search action
FAST 2011: Leuven, Belgium
- Gilles Barthe

, Anupam Datta, Sandro Etalle:
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7140, Springer 2012, ISBN 978-3-642-29419-8 - Mihhail Aizatulin, François Dupressoir

, Andrew D. Gordon, Jan Jürjens:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge. 1-20 - Willem De Groef, Dominique Devriese

, Frank Piessens:
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation. 21-38 - Mário S. Alvim

, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi
:
Differential Privacy: On the Trade-Off between Utility and Information Leakage. 39-54 - Luciano Bello, Eduardo Bonelli:

On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow. 55-69 - Barbara Espinoza, Geoffrey Smith:

Min-Entropy Leakage of Channels in Cascade. 70-84 - Riccardo Focardi

, Flaminia L. Luccio
:
Secure Recharge of Disposable RFID Tickets. 85-99 - Simon N. Foley

, Samane Abdi:
Avoiding Delegation Subterfuge Using Linked Local Permission Names. 100-114 - Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl:

Verifiable Control Flow Policies for Java Bytecode. 115-130 - Sibylle B. Fröschle, Nils Sommer:

Concepts and Proofs for Configuring PKCS#11. 131-147 - Richard Gay, Heiko Mantel, Barbara Sprick:

Service Automata. 148-163 - Thomas Gibson-Robinson

, Gavin Lowe:
Analysing Applications Layered on Unilaterally Authenticating Protocols. 164-181 - Robert Grabowski, Martin Hofmann, Keqin Li:

Type-Based Enforcement of Secure Programming Guidelines - Code Injection Prevention at SAP. 182-197 - Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, John C. Mitchell:

TBA : A Hybrid of Logic and Extensional Access Control Systems. 198-213 - Sebastian Mödersheim

:
Diffie-Hellman without Difficulty. 214-229 - Behnam Sattarzadeh, Mehran S. Fallah:

Is Cryptyc Able to Detect Insider Attacks? 230-244 - Ben Smyth, Mark Ryan

, Liqun Chen
:
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. 245-262 - Mohammad Torabi Dashti

, Jan Cederquist
, Yanjing Wang
:
Risk Balance in Optimistic Non-repudiation Protocols. 263-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














