-
1
-
-
84869486464
-
Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols
-
ACM Press New York
-
Jose Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, and Santiago Zanella-Beguelin. 2012. Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols. In Proceedngs of the 19th ACM Conference on Computer and Communications Security (CCS'12). ACM Press, New York, 488-500.
-
(2012)
Proceedngs of the 19th ACM Conference on Computer and Communications Security (CCS'12)
, pp. 488-500
-
-
Almeida, J.B.1
Barbosa, M.2
Bangerter, E.3
Barthe, G.4
Krenn, S.5
Zanella-Beguelin, S.6
-
6
-
-
84865611328
-
Towards provably robust watermarking
-
Springer
-
David Baelde, Pierre Courtieu, David Gross-Amblard, and Christine Paulin-Mohring. 2012. Towards provably robust watermarking. In Proceedings of the 3rd International Conference on Interactive Theorem Proving (ITP'12). Lecture Notes in Computer Science, vol. 7406, Springer, 201-216.
-
(2012)
Proceedings of the 3rd International Conference on Interactive Theorem Proving (ITP'12). Lecture Notes in Computer Science
, vol.7406
, pp. 201-216
-
-
Baelde, D.1
Courtieu, P.2
Gross-Amblard, D.3
Paulin-Mohring, C.4
-
11
-
-
80051978821
-
Computer-aided security proofs for the working cryptographer
-
Springer
-
Gilles Barthe, Benjamin Gregoire, Sylvain Heraud, and Santiago Zanella-Beguelin. 2011a. Computer-aided security proofs for the working cryptographer. In Advances in Cryptology - CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, Springer, 71-90.
-
(2011)
Advances in Cryptology - CRYPTO 2011. Lecture Notes in Computer Science
, vol.6841
, pp. 71-90
-
-
Barthe, G.1
Gregoire, B.2
Heraud, S.3
Zanella-Beguelin, S.4
-
12
-
-
79959973393
-
Relational verification using product progams
-
Springer
-
Gilles Barthe, Juan Manuel Crespo, and Cesar Kunz. 2011b. Relational verification using product progams. In Proceedings of the 17th International Symposium on Formal Methods (FM'11). Lecture Notes in Computer Science, vol. 6664, Springer, 200-214.
-
(2011)
Proceedings of the 17th International Symposium on Formal Methods (FM'11). Lecture Notes in Computer Science
, vol.6664
, pp. 200-214
-
-
Barthe, G.1
Crespo, J.M.2
Kunz, C.3
-
13
-
-
84857188426
-
Probabilistic relational reasoning for differential privacy
-
ACM Press New York
-
Gilles Barthe, Boris Kopf, Federico Olmedo, and Santiago Zanella-Beguelin. 2012. Probabilistic relational reasoning for differential privacy. In Proceedings of the 39th ACM SIGPLAN SIGACT Symposium on Principles of Programming Languages (POPL'12). ACM Press, New York, 97-110.
-
(2012)
Proceedings of the 39th ACM SIGPLAN SIGACT Symposium on Principles of Programming Languages (POPL'12)
, pp. 97-110
-
-
Barthe, G.1
Kopf, B.2
Olmedo, F.3
Zanella-Beguelin, S.4
-
14
-
-
84884999092
-
Verified computational differential privacy with applications to smart metering
-
IEEE Computer Society Los Alamitos CA. To appear
-
Gilles Barthe, George Danezis, Benjamin Gregoire, Cesar Kunz, and Santiago Zanella-Beguelin. 2013. Verified computational differential privacy with applications to smart metering. In Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF'13). IEEE Computer Society, Los Alamitos, CA. To appear.
-
(2013)
Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF'13)
-
-
Barthe, G.1
Danezis, G.2
Gregoire, B.3
Kunz, C.4
Zanella-Beguelin, S.5
-
15
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Springer
-
Amos Beimel, Kobbi Nissim, and Eran Omri. 2008. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology - CRYPTO 2008. Lecture Notes in Computer Science, vol. 5157, Springer, 451-468.
-
(2008)
Advances in Cryptology - CRYPTO 2008. Lecture Notes in Computer Science
, vol.5157
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
18
-
-
34248206760
-
Reasoning about probabilistic sequential programs
-
Rohit Chadha, Luis Cruz-Filipe, Paulo Mateus, and Amilcar Sernadas. 2007. Reasoning about probabilistic sequential programs. Theor. Comput. Sci. 379, 1-2, 142-165.
-
(2007)
Theor. Comput. Sci.
, vol.379
, Issue.1-2
, pp. 142-165
-
-
Chadha, R.1
Cruz-Filipe, L.2
Mateus, P.3
Sernadas, A.4
-
19
-
-
77955334135
-
Private and continual release of statistics
-
Springer
-
Terry-H. Hubert Chan, Elaine Shi, and Dawn Song. 2010. Private and continual release of statistics. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10). Lecture Notes in Computer Science, vol. 6199, Springer, 405-417.
-
(2010)
Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10). Lecture Notes in Computer Science
, vol.6199
, pp. 405-417
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
20
-
-
80053201999
-
Proving programs robust
-
ACM Press New York
-
Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman, and Sara Navidpour. 2011. Proving programs robust. In Proceedings of the 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering and the 13th European Software Engineering Conference (ESEC/FSE'11). ACM Press, New York, 102-112.
-
(2011)
Proceedings of the 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering and the 13th European Software Engineering Conference (ESEC/FSE'11)
, pp. 102-112
-
-
Chaudhuri, S.1
Gulwani, S.2
Lublinerman, R.3
Navidpour, S.4
-
21
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
David Clark, Sebastian Hunt, and Pasquale Malacaria. 2007. A static analysis for quantifying information flow in a simple imperative language. J. Comput. Secur. 15, 3, 321-371.
-
(2007)
J. Comput. Secur.
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
24
-
-
77950849928
-
-
Tech. rep. UCAMCL-TR-785. University of Cambridge, Computer Laboratory
-
Aaron R. Coble. 2010. Anonymity, information, and machine-assisted proof. Tech. rep. UCAMCL-TR-785. University of Cambridge, Computer Laboratory. http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-785.pdf.
-
(2010)
Anonymity, Information, and Machine-assisted Proof
-
-
Coble, A.R.1
-
27
-
-
56849104494
-
Approximate analysis of probabilistic processes: Logic, simulation and games
-
IEEE Computer Society Los Alamitos CA
-
Josee Desharnais, Francois Laviolette, and Mathieu Tracol. 2008. Approximate analysis of probabilistic processes: Logic, simulation and games. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08). IEEE Computer Society, Los Alamitos, CA, 264-273.
-
(2008)
Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08)
, pp. 264-273
-
-
Desharnais, J.1
Laviolette, F.2
Tracol, M.3
-
28
-
-
0344875573
-
Approximate non-interference
-
Alessandra Di Pierro, Chris Hankin, and Herbert Wiklicky. 2004. Approximate non-interference. J. Comput. Secur. 12, 1, 37-82.
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.1
, pp. 37-82
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
30
-
-
78650804208
-
A firm foundation for private data analysis
-
Cynthia Dwork. 2011. A firm foundation for private data analysis. Comm. ACM 54, 1, 86-95.
-
(2011)
Comm. ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
31
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
Cynthia Dwork, Krishnaram Kenthapadi, Frank Mcsherry, Ilya Mironov, and Moni Naor. 2006a. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology - EUROCRYPT 2006. Lecture Notes in Computer Science, vol. 4004, Springer, 486-503.
-
(2006)
Advances in Cryptology - EUROCRYPT 2006. Lecture Notes in Computer Science
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
32
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, and Adam Smith. 2006b. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference (TCC'06). Lecture Notes in Computer Science, vol. 3876, Springer, 265-284.
-
(2006)
Proceedings of the 3rd Theory of Cryptography Conference (TCC'06). Lecture Notes in Computer Science
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
34
-
-
0021409130
-
A probabilistic dynamic logic
-
Yishai A. Feldman and David Harel. 1984. A probabilistic dynamic logic. J. Comput. Syst. Sci. 28, 2, 193-215.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 193-215
-
-
Feldman, Y.A.1
Harel, D.2
-
35
-
-
0031268197
-
Polynomial-time highest-gain augmenting path algorithms for the generalized circulation problem
-
Donald Goldfarb, Zhiying Jin, and James B. Orlin, J. B. 1997. Polynomial-time highest-gain augmenting path algorithms for the generalized circulation problem. Math. Oper. Res. 22, 4, 793-802.
-
(1997)
Math. Oper. Res.
, vol.22
, Issue.4
, pp. 793-802
-
-
Goldfarb, D.1
Jin, Z.2
Orlin, J.B.J.B.3
-
36
-
-
77951678087
-
Differentially private combinatorial optimization
-
SIAM
-
Anupam Gupta, Katrina Ligett, Frank Mcsherry, Aaron Roth, and Kunal Talwar. 2010. Differentially private combinatorial optimization. In Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'10). SIAM, 1106-1125.
-
(2010)
Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'10)
, pp. 1106-1125
-
-
Gupta, A.1
Ligett, K.2
McSherry, F.3
Roth, A.4
Talwar, K.5
-
38
-
-
0037565668
-
-
Tech. rep. UCAM-CL-TR-566, University of Cambridge, Computer Laboratory
-
Joe Hurd. 2003. Formal verification of probabilistic algorithms. Tech. rep. UCAM-CL-TR-566, University of Cambridge, Computer Laboratory. http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-566.pdf.
-
(2003)
Formal Verification of Probabilistic Algorithms
-
-
Hurd, J.1
-
39
-
-
27744471200
-
Probabilistic guarded commands mechanized in hol
-
Joe Hurd, Annabelle Mciver, and Carroll Morgan. 2005. Probabilistic guarded commands mechanized in hol. Theor. Comput. Sci. 346, 1, 96-112.
-
(2005)
Theor. Comput. Sci.
, vol.346
, Issue.1
, pp. 96-112
-
-
Hurd, J.1
McIver, A.2
Morgan, C.3
-
40
-
-
0004270633
-
-
Ph.D. dissertation, University of Edinburgh
-
Claire Jones. 1993. Probabilistic non-determinism. Ph.D. dissertation, University of Edinburgh. http://www.lfcs.inf.ed.ac.uk/reports/90/ECS-LFCS-90- 105/.
-
(1993)
Probabilistic Non-determinism
-
-
Jones, C.1
-
41
-
-
0005411712
-
Probabilistic extensions of process algebras
-
Elsevier Amsterdam
-
Bengt Jonsson,Wang Yi, and Kim G. Larsen. 2001. Probabilistic extensions of process algebras. In Handbook of Process Algebra. Elsevier, Amsterdam, 685-710.
-
(2001)
Handbook of Process Algebra
, pp. 685-710
-
-
Jonsson, B.1
Yi, W.2
Larsen, K.G.3
-
44
-
-
0020732231
-
A probabilistic pdl
-
Dexter Kozen. 1985. A probabilistic pdl. J. Comput. Syst. Sci. 30, 2,162-178.
-
(1985)
J. Comput. Syst. Sci.
, vol.30
, Issue.2
, pp. 62-178
-
-
Kozen, D.1
-
48
-
-
77955040105
-
On the formalization of the lebesgue integration theory in hol
-
Springer
-
Tarek Mhamdi, Osman Hasan, and Sofiene Tahar. 2010. On the formalization of the lebesgue integration theory in hol. In Proceedings of the 1st International Conference on Interactive Theorem Proving (ITP'10). Lecture Notes in Computer Science, vol. 6172, Springer, 387-402.
-
(2010)
Proceedings of the 1st International Conference on Interactive Theorem Proving (ITP'10). Lecture Notes in Computer Science
, vol.6172
, pp. 387-402
-
-
Mhamdi, T.1
Hasan, O.2
Tahar, S.3
-
49
-
-
80052156246
-
Formalization of entropy measures in hol
-
Springer
-
Tarek Mhamdi, Osman Hasan, and Sofiene Tahar. 2011. Formalization of entropy measures in hol. In Proceedings of the 2nd International Conference on Interactive Theorem Proving (ITP'11). Lecture Notes in Computer Science, vol. 6898, Springer, 233-248.
-
(2011)
Proceedings of the 2nd International Conference on Interactive Theorem Proving (ITP'11). Lecture Notes in Computer Science
, vol.6898
, pp. 233-248
-
-
Mhamdi, T.1
Hasan, O.2
Tahar, S.3
-
50
-
-
70350338483
-
Computational differential privacy
-
Springer
-
Ilya Mironov, Omkant Pandey, Omer Reingold, and Salil Vadhan. 2009. Computational differential privacy. In Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, Springer, 126-142.
-
(2009)
Advances in Cryptology - CRYPTO 2009. Lecture Notes in Computer Science
, vol.5677
, pp. 126-142
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.4
-
51
-
-
0030143516
-
Probabilistic predicate transformers
-
Carroll Morgan, Annabelle Mciver, and Karen Seidel. 1996. Probabilistic predicate transformers. ACM Trans. Program. Lang. Syst. 18, 3, 325-353.
-
(1996)
ACM Trans. Program. Lang. Syst.
, vol.18
, Issue.3
, pp. 325-353
-
-
Morgan, C.1
McIver, A.2
Seidel, K.3
-
52
-
-
0004160242
-
-
Prentice Hall, Englewood Cliffs, NJ
-
Katta G. Murty. 1992. Network Programming. Prentice Hall, Englewood Cliffs, NJ.
-
(1992)
Network Programming
-
-
Murty, K.G.1
-
58
-
-
85015649873
-
Airavat: Security and privacy for mapreduce
-
USENIX Association Berkeley CA
-
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: Security and privacy for mapreduce. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI'10). USENIX Association, Berkeley, CA, 297-312.
-
(2010)
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI'10)
, pp. 297-312
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
60
-
-
35048868422
-
Approximated computationally bounded simulation relations for probabilistic automata
-
IEEE Computer Society Los Alamitos
-
Roberto Segala and Andrea Turrini. 2007. Approximated computationally bounded simulation relations for probabilistic automata. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07). IEEE Computer Society, Los Alamitos, 140-156.
-
(2007)
Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07)
, pp. 140-156
-
-
Segala, R.1
Turrini, A.2
-
63
-
-
80054887187
-
Formal verification of differential privacy for interactive systems
-
Michael Carl Tschantz, Dilsun Kaynar, and Anupam Datta. 2011. Formal verification of differential privacy for interactive systems. Electron. Notes Theor. Comput. Sci. 276, 61-79.
-
(2011)
Electron. Notes Theor. Comput. Sci.
, vol.276
, pp. 61-79
-
-
Tschantz, M.C.1
Kaynar, D.2
Datta, A.3
|