-
3
-
-
17644411480
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. SIGPLAN Not. 36, 104-115 (2001)
-
(2001)
SIGPLAN Not.
, vol.36
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
85026581986
-
Helios: Web-based open-audit voting
-
Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335-348 (2008)
-
(2008)
USENIX Security Symposium
, pp. 335-348
-
-
Adida, B.1
-
5
-
-
85084160402
-
Rootkits for JavaScript environments
-
Adida, B., Barth, A., Jackson, C.: Rootkits for JavaScript environments. In: Workshop on Offensive Technologies, WOOT (2009)
-
Workshop on Offensive Technologies, WOOT (2009)
-
-
Adida, B.1
Barth, A.2
Jackson, C.3
-
6
-
-
77957587422
-
Towards a formal foundation of web security
-
Akhawe, D., Barth, A., Lam, P.E., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: CSF, pp. 290-304 (2010)
-
(2010)
CSF
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.E.3
Mitchell, J.4
Song, D.5
-
7
-
-
84859355144
-
Privacy Supporting Cloud Computing: ConfiChair, a Case Study
-
Degano, P., Guttman, J.D. (eds.) POST 2012. Springer, Heidelberg
-
Arapinis, M., Bursuc, S., Ryan, M.: Privacy Supporting Cloud Computing: ConfiChair, a Case Study. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol. 7215, pp. 89-108. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7215
, pp. 89-108
-
-
Arapinis, M.1
Bursuc, S.2
Ryan, M.3
-
8
-
-
84866927100
-
Discovering concrete attacks on website authorization by formal analysis
-
Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: CSF, pp. 247-262 (2012)
-
(2012)
CSF
, pp. 247-262
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
9
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: CCS, pp. 75-88 (2008)
-
(2008)
CCS
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
12
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
15
-
-
84869427671
-
Featherweight Firefox: Formalizing the core of a web browser
-
Bohannon, A., Pierce, B.C.: Featherweight Firefox: Formalizing the core of a web browser. In: WebApps (2010)
-
(2010)
WebApps
-
-
Bohannon, A.1
Pierce, B.C.2
-
16
-
-
33646034935
-
Browser Model for Security Analysis of Browser-Based Protocols
-
De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Groß, T.R., Pfitzmann, B., Sadeghi, A.-R.: Browser Model for Security Analysis of Browser-Based Protocols. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 489-508. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 489-508
-
-
Groß, T.R.1
Pfitzmann, B.2
Sadeghi, A.-R.3
-
18
-
-
84959059587
-
Alloy: A Logical Modelling Language
-
Bert, D., Bowen, J.P., King, S., Waldén, M. (eds.) ZB 2003. Springer, Heidelberg
-
Jackson, D.: Alloy: A Logical Modelling Language. In: Bert, D., Bowen, J.P., King, S., Waldén, M. (eds.) ZB 2003. LNCS, vol. 2651, p. 1. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2651
, pp. 1
-
-
Jackson, D.1
-
19
-
-
77956137294
-
Cryptographic Cloud Storage
-
Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. Springer, Heidelberg
-
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 136-149. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
20
-
-
84947906944
-
Secure Applications of Low-Entropy Keys
-
Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. Springer, Heidelberg
-
Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure Applications of Low-Entropy Keys. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 121-134. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1396
, pp. 121-134
-
-
Kelsey, J.1
Schneier, B.2
Hall, C.3
Wagner, D.4
-
22
-
-
80755172908
-
Busting frame busting: A study of clickjacking vulnerabilities at popular sites
-
Rydstedt, G., Bursztein, E., Boneh, D., Jackson, C.: Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In: Web 2.0 S&P (2010)
-
(2010)
Web 2.0 S&P
-
-
Rydstedt, G.1
Bursztein, E.2
Boneh, D.3
Jackson, C.4
-
24
-
-
77950302301
-
Information-Flow-Based Access Control for Web Browsers
-
Yoshihama, S., Tateishi, T., Tabuchi, N., Matsumoto, T.: Information-Flow-Based Access Control for Web Browsers. IEICE Transactions E92-D(5), 836-850 (2009)
-
(2009)
IEICE Transactions
, vol.E92-D
, Issue.5
, pp. 836-850
-
-
Yoshihama, S.1
Tateishi, T.2
Tabuchi, N.3
Matsumoto, T.4
|