-
1
-
-
0032681509
-
A core calculus of dependency
-
New York, NY, USA, ACM Press
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke. A core calculus of dependency. In Proc. ACM Symp. on Principles of Programming Languages, pages 147-160, New York, NY, USA, 1999. ACM Press.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
4
-
-
36448974611
-
Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow analysis of pointer programs
-
TR 2005-1, Kansas State University, July
-
Torben. Amtoft, Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow analysis of pointer programs. Technical Report CIS TR 2005-1, Kansas State University, July 2005.
-
(2005)
Technical Report CIS
-
-
Torben1
Amtoft2
-
5
-
-
33745806932
-
Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow in object-oriented programs
-
New York, NY, USA, ACM Press
-
Torben. Amtoft, Sruthi Bandhakavi, and Anindya Banerjee. A logic for information flow in object-oriented programs. In Proc. ACM Symp. on Principles of Programming Languages, pages 91-102, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 91-102
-
-
Torben1
Amtoft2
-
6
-
-
33646826538
-
Manual Barbosa and Daniel Page. On the automatic construction of indistinguishable operations
-
Manual Barbosa and Daniel Page. On the automatic construction of indistinguishable operations. In IMA Int. Conf, pages 233-247, 2005.
-
(2005)
IMA Int. Conf
, pp. 233-247
-
-
-
8
-
-
36448994127
-
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
-
Technical Report RS-05-18, BRICS, June, 37 pp
-
Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and Tomas Toft. Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications. Technical Report RS-05-18, BRICS, June 2005. 37 pp.
-
(2005)
-
-
Bogetoft, P.1
Damgård, I.2
Jakobsen, T.3
Nielsen, K.4
Pagter, J.5
Toft, T.6
-
9
-
-
84858472511
-
-
Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and Tomas Toft. A practical implementation of secure auctions based on multiparty integer computation. In Proc. of Financial Cryptography, 4.107 of LNCS. Springer-Verlag, 2006.
-
Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, and Tomas Toft. A practical implementation of secure auctions based on multiparty integer computation. In Proc. of Financial Cryptography, volume 4.107 of LNCS. Springer-Verlag, 2006.
-
-
-
-
10
-
-
18844454571
-
Remote timing attacks are practical
-
David Brumley and Dan Boneh. Remote timing attacks are practical. Comput. Networks, 48(5):701-716, 2005.
-
(2005)
Comput. Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
11
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. IEEE Symp. on Foundations of Computer Science, pages 136-145, 2001.
-
(2001)
Proc. IEEE Symp. on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
12
-
-
36448941560
-
Quantitative analysis of the leakage of confidential data
-
January
-
David Clark, Sebastian Hunt, and Pasquale Malacaria. Quantitative analysis of the leakage of confidential data. J. Theoretical Computer Science, 59(3):1-14, January 2004.
-
(2004)
J. Theoretical Computer Science
, vol.59
, Issue.3
, pp. 1-14
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
13
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
Patrick Cousot and Radhia Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. ACM Symp. on Principles of Programming Languages, pages 238-252, 1977.
-
(1977)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
14
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Proc. Theory of Cryptography Conference, of, Springer-Verlag, May
-
Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, and Tomas Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Proc. Theory of Cryptography Conference, volume 3876 of LNCS, pages 285-304. Springer-Verlag, May 2006.
-
(2006)
LNCS
, vol.3876
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Buus Nielsen, J.4
Toft, T.5
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy Elizabeth Rob Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Elizabeth, D.1
Denning, R.2
-
16
-
-
0017517624
-
Certification of programs for secure information flow
-
Dorothy Elizabeth Rob Denning and Peter J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Elizabeth, D.1
Denning, R.2
Denning, P.J.3
-
17
-
-
1442286773
-
On the secure implementation of security protocols
-
Pablo Giambiagi and Mads Dam. On the secure implementation of security protocols. Sci. Comput. Program., 50(1-3):73-99, 2004.
-
(2004)
Sci. Comput. Program
, vol.50
, Issue.1-3
, pp. 73-99
-
-
Giambiagi, P.1
Dam, M.2
-
18
-
-
0020299523
-
Security policies and security models
-
IEEE Computer Society Press
-
Joseph A. Goguen and José Meseguer. Security policies and security models. In Proc. IEEE Symp. on Security and Privacy, pages 11-20. IEEE Computer Society Press, 1982.
-
(1982)
Proc. IEEE Symp. on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
19
-
-
0031701347
-
The SLam calculus: Programming with, secrecy and integrity
-
New York, NY, USA, ACM Press
-
Nevin Heintze and Jon G. Riecke. The SLam calculus: programming with, secrecy and integrity. In Proc. ACM Symp. on Principles of Programming Languages, pages 365-377, New York, NY, USA, 1998. ACM Press.
-
(1998)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
20
-
-
36448988684
-
-
Thomas Jakobsen and Strange From. Secure multi-party computation on integers. Master's thesis, Department of Computer Science, DAIMI, University of Aarhus, Denmark, July 2005.
-
Thomas Jakobsen and Strange From. Secure multi-party computation on integers. Master's thesis, Department of Computer Science, DAIMI, University of Aarhus, Denmark, July 2005.
-
-
-
-
21
-
-
84943632039
-
Timing attacks on implementations of DiffieHellman, RSA, DSS, and other systems
-
Proc. International Ctyptology Conference on Advances in Cryptology, of, London, UK, Springer-Verlag
-
Paul C. Kocher. Timing attacks on implementations of DiffieHellman, RSA, DSS, and other systems. In Proc. International Ctyptology Conference on Advances in Cryptology, volume 1109 of LNCS, pages 104-113, London, UK, 1996. Springer-Verlag.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
24
-
-
28144461940
-
Downgrading policies and relaxed noninterference
-
New York, NY, USA, ACM Press
-
Peng Li and Steve Zdancewic. Downgrading policies and relaxed noninterference. In Proc. ACM Symp. on Principles of Programming Languages, pages 158-170, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 158-170
-
-
Li, P.1
Zdancewic, S.2
-
25
-
-
85084163840
-
Fairplay - A Secure Two-Party Computation System
-
Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. Fairplay - A Secure Two-Party Computation System. In Proc. of USENIX Security Symposium, pages 287-302, 2004.
-
(2004)
Proc. of USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
26
-
-
35048815139
-
Controlled declassification based on intransitive noninterference
-
Proc. of the ASIAN Symposium on Programming Languages and Systems, of, Taipei, Taiwan, November 4-6, Springer-Verlag
-
Heiko Mantel and David Sands. Controlled declassification based on intransitive noninterference. In Proc. of the ASIAN Symposium on Programming Languages and Systems, volume 3303 of LNCS, pages 129-145, Taipei, Taiwan, November 4-6 2004. Springer-Verlag.
-
(2004)
LNCS
, vol.3303
, pp. 129-145
-
-
Mantel, H.1
Sands, D.2
-
27
-
-
28144441375
-
On declassification and the non-disclosure policy
-
Washington, DC, USA, IEEE Computer Society Press
-
Ana Ameida Matos and Gerard Boudol. On declassification and the non-disclosure policy. In Proc. IEEE Computer Security Foundations Workshop, pages 226-240, Washington, DC, USA, 2005. IEEE Computer Society Press.
-
(2005)
Proc. IEEE Computer Security Foundations Workshop
, pp. 226-240
-
-
Ameida Matos, A.1
Boudol, G.2
-
29
-
-
36448945897
-
The SMCL Language Specification
-
Technical Report RS-07-9, BRICS, April
-
Janus Dam Nielsen and Michael I. Schwartzbach. The SMCL Language Specification. Technical Report RS-07-9, BRICS, April 2007.
-
(2007)
-
-
Dam Nielsen, J.1
Schwartzbach, M.I.2
-
33
-
-
35048828759
-
A model for delimited information release
-
Pmc. of the International Symposium on Software Security, of, Springer-Verlag, October
-
Andrei Sabelfeld and Andrew Myers. A model for delimited information release. In Pmc. of the International Symposium on Software Security, volume 3233 of LNCS, pages 174-191. Springer-Verlag, October 2004.
-
(2004)
LNCS
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.2
-
34
-
-
84957869855
-
A per model of secure information flow in sequential programs
-
Andrei Sabelfeld and David Sands. A per model of secure information flow in sequential programs. In Proc. European Symposium on Programming, pages 40-58, 1999.
-
(1999)
Proc. European Symposium on Programming
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
35
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
Washington, DC, USA, July, IEEE Computer Society Press
-
Andrei Sabelfeld and David Sands. Probabilistic noninterference for multi-threaded programs. In Proc. IEEE Computer Security Foundations Workshop, page 200, Washington, DC, USA, July 2000. IEEE Computer Society Press.
-
(2000)
Proc. IEEE Computer Security Foundations Workshop
, pp. 200
-
-
Sabelfeld, A.1
Sands, D.2
-
36
-
-
28144453799
-
Dimensions and principles of declassification
-
Washington, DC, USA, IEEE Computer Society Press
-
Andrei Sabelfeld and David Sands. Dimensions and principles of declassification. In Proc. IEEE Computer Security Foundations Workshop, pages 255-269, Washington, DC, USA, 2005. IEEE Computer Society Press.
-
(2005)
Proc. IEEE Computer Security Foundations Workshop
, pp. 255-269
-
-
Sabelfeld, A.1
Sands, D.2
-
38
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
New York, NY
-
Geoffrey Smith and Dennis Volpano. Secure information flow in a multi-threaded imperative language. In Proc. ACM Symp. on Principles of Programming Languages, pages 355-364, New York, NY, 1998.
-
(1998)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
39
-
-
33750087380
-
Secure Integer Computation with Applications in Economics
-
July
-
Tomas Toft. Progress report - Secure Integer Computation with Applications in Economics., July 2005.
-
(2005)
Progress report
-
-
Toft, T.1
-
41
-
-
26844470115
-
Information Flow Analysis for VHDL
-
Victor E. Malyshkin, editor, Proc. International Conference on Parallel Computing Technologies, of, Springer-Verlag, September
-
Terkel K. Tolstrup, Flemming Nielson, and Hanne Riis Nielson. Information Flow Analysis for VHDL. In Victor E. Malyshkin, editor, Proc. International Conference on Parallel Computing Technologies, volume 3606 of LNCS, pages 79-98. Springer-Verlag, September 2005.
-
(2005)
LNCS
, vol.3606
, pp. 79-98
-
-
Tolstrup, T.K.1
Nielson, F.2
Riis Nielson, H.3
-
42
-
-
0001813087
-
Domain-specific languages: An annotated bibliography
-
Arie van Deursen, Paul Klint, and Joost Visser. Domain-specific languages: An annotated bibliography. SIGPLAN Notices, 35(6):26-36, 2000.
-
(2000)
SIGPLAN Notices
, vol.35
, Issue.6
, pp. 26-36
-
-
Arie van Deursen, P.K.1
Visser, J.2
-
45
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3): 167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
49
-
-
36448997106
-
Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning
-
Technical Report 2001-1846, Cornell University
-
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning. Technical Report 2001-1846, Cornell University, 2001.
-
(2001)
-
-
Steve1
|