


default search action
3rd POST 2014: Grenoble, France (Part of ETAPS 2014)
- Martín Abadi, Steve Kremer
:
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Lecture Notes in Computer Science 8414, Springer 2014, ISBN 978-3-642-54791-1
Analysis of Cryptographic Protocols
- David Baelde, Stéphanie Delaune, Lucca Hirschi:
A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems. 1-21 - Myrto Arapinis, Jia Liu
, Eike Ritter, Mark Ryan
:
Stateful Applied Pi Calculus. 22-41 - Michael Backes, Esfandiar Mohammadi, Tim Ruffing
:
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity. 42-62 - Marion Daubignard, David Lubicz, Graham Steel:
A Secure Key Management Interface with Asymmetric Cryptography. 63-82
Quantitative Aspects of Information Flow
- Annabelle McIver
, Carroll Morgan, Geoffrey Smith, Barbara Espinoza, Larissa Meinicke
:
Abstract Channels and Their Robust Information-Leakage Ordering. 83-102 - Rohit Chadha, Dileep Kini, Mahesh Viswanathan:
Quantitative Information Flow in Boolean Programs. 103-119 - Mário S. Alvim
, Andre Scedrov
, Fred B. Schneider:
When Not All Bits Are Equal: Worth-Based Information Flow. 120-139 - Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa
:
Leakage Resilience against Concurrent Cache Attacks. 140-158
Information Flow Control in Programming Languages
- Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Information Flow Control in WebKit's JavaScript Bytecode. 159-178 - David Costanzo, Zhong Shao
:
A Separation Logic for Enforcing Declarative Information Flow Control Policies. 179-198 - Jed Liu, Andrew C. Myers:
Defining and Enforcing Referential Security. 199-219
Cryptography in Implementations
- Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf:
Extending and Applying a Framework for the Cryptographic Verification of Java Programs. 220-239 - Manuel Barbosa
, David Castro, Paulo F. Silva
:
Compiling CAO: From Cryptographic Specifications to C Implementations. 240-244
Policies and Attacks
- Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti
, David A. Basin:
Decentralized Composite Access Control. 245-264 - Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez
:
Temporal Logics for Hyperproperties. 265-284 - Florian Arnold, Holger Hermanns, Reza Pulungan
, Mariëlle Stoelinga
:
Time-Dependent Analysis of Attacks. 285-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.