-
1
-
-
85026581986
-
Helios: Web-based open-audit voting
-
Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335-348 (2008)
-
(2008)
USENIX Security Symposium
, pp. 335-348
-
-
Adida, B.1
-
2
-
-
85084160402
-
Rootkits for JavaScript environments
-
Adida, B., Barth, A., Jackson, C.: Rootkits for JavaScript environments. In: WOOT (2009)
-
(2009)
WOOT
-
-
Adida, B.1
Barth, A.2
Jackson, C.3
-
3
-
-
77957587422
-
Towards a formal foundation of web security
-
Akhawe, D., Barth, A., Lam, P., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: IEEE CSF 2010, pp. 290-304(2010)
-
(2010)
IEEE CSF 2010
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.3
Mitchell, J.4
Song, D.5
-
5
-
-
84859355144
-
Privacy supporting cloud computing: ConfiChair, a case study
-
In: Degano, P., Guttman, J.D. (eds.), Springer, Heidelberg
-
Arapinis, M., Bursuc, S., Ryan, M.: Privacy supporting cloud computing: ConfiChair, a case study. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol. 7215, pp. 89-108. Springer, Heidelberg (2012)
-
(2012)
POST 2012. LNCS
, vol.7215
, pp. 89-108
-
-
Arapinis, M.1
Bursuc, S.2
Ryan, M.3
-
6
-
-
84881236986
-
JavaSPI: A framework for security protocol implementation
-
Avalle, M., Pironti, A., Pozza, D., Sisto, R.: JavaSPI: A framework for security protocol implementation. International Journal of Secure Software Engineering 2, 34-48 (2011)
-
(2011)
International Journal of Secure Software Engineering
, vol.2
, pp. 34-48
-
-
Avalle, M.1
Pironti, A.2
Pozza, D.3
Sisto, R.4
-
7
-
-
84874442652
-
Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
-
In: Basin, D., Mitchell, J.C. (eds.), Springer, Heidelberg
-
Bansal, C., Bhargavan, K., Delignat-Lavaud, A., Maffeis, S.: Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol. 7796, pp. 126-146. Springer, Heidelberg (2013)
-
(2013)
POST 2013. LNCS
, vol.7796
, pp. 126-146
-
-
Bansal, C.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Maffeis, S.4
-
8
-
-
84866927100
-
Discovering concrete attacks on website authorization by formal analysis
-
Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: CSF, pp. 247-262 (2012)
-
(2012)
CSF
, pp. 247-262
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
9
-
-
85166275153
-
Protecting browsers from extension vulnerabilities
-
Barth, A., Felt, A.P., Saxena, P., Boodman, A.: Protecting browsers from extension vulnerabilities. In:Network andDistributed SystemSecurity Symposium,NDSS (2010)
-
(2010)
Network Anddistributed Systemsecurity Symposium,Ndss
-
-
Barth, A.1
Felt, A.P.2
Saxena, P.3
Boodman, A.4
-
10
-
-
85084162607
-
Web-based attacks on host-proof encrypted storage
-
Bhargavan, K., Delignat-Lavaud, A.: Web-based attacks on host-proof encrypted storage. In: WOOT (2012)
-
(2012)
WOOT
-
-
Bhargavan, K.1
Delignat-Lavaud, A.2
-
11
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
Bhargavan, K., Fournet, C., Gordon, A.D., Tse, S.: Verified interoperable implementations of security protocols. In: CSFW, pp. 139-152 (2006)
-
(2006)
CSFW
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
13
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
16
-
-
85066366136
-
ECMA International: ECMAScript language specification
-
3rd edn
-
ECMA International: ECMAScript language specification. Stardard ECMA-262, 3rd edn. (1999)
-
(1999)
Stardard ECMA-262
-
-
-
18
-
-
84874150343
-
Fully abstract compilation to JavaScript
-
Fournet, C., Swamy, N., Chen, J., Dagand, P., Strub, P., Livshits, B.: Fully abstract compilation to JavaScript. In: POPL 2013 (2013)
-
(2013)
POPL 2013
-
-
Fournet, C.1
Swamy, N.2
Chen, J.3
Dagand, P.4
Strub, P.5
Livshits, B.6
-
19
-
-
84895539842
-
The OAuth 2.0 authorization framework
-
Hardt, D.: The OAuth 2.0 authorization framework. IETF RFC 6749 (2012)
-
(2012)
IETF RFC
-
-
Hardt, D.1
-
22
-
-
85029541226
-
Functions as processes
-
In: Paterson, M. (ed.)
-
Milner, R.: Functions as processes. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol. 443, pp. 167-180. Springer, Heidelberg (1990)
-
(1990)
ICALP 1990. LNCS
, vol.443
, pp. 167-180
-
-
Milner, R.1
-
23
-
-
77950845925
-
Symmetric cryptography in JavaScript
-
Stark, E., Hamburg, M., Boneh, D.: Symmetric cryptography in JavaScript. In: ACSAC, pp. 373-381 (2009)
-
(2009)
ACSAC
, pp. 373-381
-
-
Stark, E.1
Hamburg, M.2
Boneh, D.3
-
25
-
-
84893514949
-
Gradual typing embedded securely in javascript
-
Swamy, N., Fournet, C., Rastogi, A., Bhargavan, K., Chen, J., Strub, P.Y., Bierman, G.M.: Gradual typing embedded securely in javascript. In: ACM Symposium on Principles of Programming Languages (POPL), pp. 425-438 (2014)
-
(2014)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 425-438
-
-
Swamy, N.1
Fournet, C.2
Rastogi, A.3
Bhargavan, K.4
Chen, J.5
Strub, P.Y.6
Bierman, G.M.7
-
26
-
-
84878355933
-
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
-
Wang, R., Chen, S., Wang, X.: Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In: IEEE S&P, pp. 365-379. IEEE Computer Society (2012)
-
(2012)
IEEE S&Amp;P
, pp. 365-379
-
-
Wang, R.1
Chen, S.2
Wang, X.3
|