-
1
-
-
80052831413
-
Iran, Facebook, and the Limits of Online Activism
-
C. Abadi. Iran, Facebook, and the Limits of Online Activism. Foreign Policy, 2010. http://www.foreignpolicy.com/articles/2010/02/12/irans-failed-facebook-revolution.
-
(2010)
Foreign Policy
-
-
Abadi, C.1
-
2
-
-
33750387038
-
Access Control in a Core Calculus of Dependency
-
M. Abadi. Access Control in a Core Calculus of Dependency. SIGPLAN Notices, 41:263-273, 2006.
-
(2006)
SIGPLAN Notices
, vol.41
, pp. 263-273
-
-
Abadi, M.1
-
3
-
-
0032681509
-
A Core Calculus of Dependency
-
ACM Press
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A Core Calculus of Dependency. In Proc. Symposium on Principles of Programming Languages (POPL'99), pages 147-160. ACM Press, 1999.
-
(1999)
Proc. Symposium on Principles of Programming Languages (POPL'99)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J. G.4
-
4
-
-
0027667638
-
A Calculus for Access Control in Distributed Systems
-
September
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 15:706-734, September 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
77956996315
-
Structure-Preserving Signatures and Commitments to Group Elements
-
Springer-Verlag
-
M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo. Structure-Preserving Signatures and Commitments to Group Elements. In Proc. Advances in Cryptology (CRYPTO'10), volume 6223 of Lecture Notes in Computer Science, pages 209-236. Springer-Verlag, 2010.
-
(2010)
Proc. Advances in Cryptology (CRYPTO'10), volume 6223 of Lecture Notes in Computer Science
, pp. 209-236
-
-
Abe, M.1
Fuchsbauer, G.2
Groth, J.3
Haralambiev, K.4
Ohkubo, M.5
-
6
-
-
78049411322
-
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols
-
J. B. Almeida, E. Bangerter, M. Barbosa, S. Krenn, A.- R. Sadeghi, and T. Schneider. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. In ESORICS'10, pages 151-167, 2010.
-
(2010)
ESORICS'10
, pp. 151-167
-
-
Almeida, J. B.1
Bangerter, E.2
Barbosa, M.3
Krenn, S.4
Sadeghi, A.- R.5
Schneider, T.6
-
10
-
-
77955437955
-
Anonymous Webs of Trust
-
Springer-Verlag
-
M. Backes, S. Lorenz, M. Maffei, and K. Pecina. Anonymous Webs of Trust. In Proc. Privacy Enhancing Technologies Symposium (PETS'10), volume 6205 of Lecture Notes in Computer Science, pages 130-148. Springer-Verlag, 2010.
-
(2010)
Proc. Privacy Enhancing Technologies Symposium (PETS'10), volume 6205 of Lecture Notes in Computer Science
, pp. 130-148
-
-
Backes, M.1
Lorenz, S.2
Maffei, M.3
Pecina, K.4
-
14
-
-
84885017157
-
G2C: Cryptographic Protocols from Goal-Driven Specifications
-
Saarbrücken, Germany, Springer-Verlag
-
M. Backes, M. Maffei, K. Pecina, and R. M. Reischuk. G2C: Cryptographic Protocols from Goal-Driven Specifications. In Proc. Conference on Theory of Security and Applications (TOSCA'11), Lecture Notes in Computer Science, Saarbrücken, Germany, 2011. Springer-Verlag.
-
(2011)
Proc. Conference on Theory of Security and Applications (TOSCA'11), Lecture Notes in Computer Science
-
-
Backes, M.1
Maffei, M.2
Pecina, K.3
Reischuk, R. M.4
-
15
-
-
78650000256
-
Computationally Sound Verification of Source Code
-
ACM
-
M. Backes, M. Maffei, and D. Unruh. Computationally Sound Verification of Source Code. In CCS '10, pages 387-398. ACM, 2010.
-
(2010)
CCS '10
, pp. 387-398
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
16
-
-
51749088371
-
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
-
IEEE
-
M. Backes and D. Unruh. Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In CSF'08, pages 255-269. IEEE, 2008.
-
(2008)
CSF'08
, pp. 255-269
-
-
Backes, M.1
Unruh, D.2
-
17
-
-
33645995393
-
Device-Enabled Authorization in the Grey System
-
Springer-Verlag
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-Enabled Authorization in the Grey System. In Proc. Information Security Conference (ISC'05), Lecture Notes in Computer Science, pages 431-445. Springer-Verlag, 2005.
-
(2005)
Proc. Information Security Conference (ISC'05), Lecture Notes in Computer Science
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J. M.3
Reiter, M. K.4
Rouse, J.5
Rutenbar, P.6
-
18
-
-
84881165182
-
Access Control on the Web Using Proof-Carrying Authorization
-
L. Bauer, M. Schneider, E. Felten, and A. Appel. Access Control on the Web Using Proof-Carrying Authorization. In Proc. DARPA Conference on Information Survivability Conference and Exposition (DISCEX'03), volume 2, pages 117-119, 2003.
-
(2003)
Proc. DARPA Conference on Information Survivability Conference and Exposition (DISCEX'03)
, vol.2
, pp. 117-119
-
-
Bauer, L.1
Schneider, M.2
Felten, E.3
Appel, A.4
-
20
-
-
69949124606
-
Randomizable Proofs and Delegatable Anonymous Credentials
-
Springer-Verlag
-
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Randomizable Proofs and Delegatable Anonymous Credentials. In Proc. Advances in Cryptology (CRYPTO'09), volume 5677 of Lecture Notes in Computer Science, pages 108-125. Springer-Verlag, 2009.
-
(2009)
Proc. Advances in Cryptology (CRYPTO'09), volume 5677 of Lecture Notes in Computer Science
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
21
-
-
51749098783
-
Refinement Types for Secure Implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis. Refinement Types for Secure Implementations. In Proc. IEEE Symposium on Computer Security Foundations (CSF'08), pages 17-32, 2008.
-
(2008)
Proc. IEEE Symposium on Computer Security Foundations (CSF'08)
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A. D.4
Maffeis, S.5
-
22
-
-
77950909049
-
Modular Verification of Security Protocol Code by Typing
-
K. Bhargavan, C. Fournet, and A. Gordon. Modular Verification of Security Protocol Code by Typing. ACM SIGPLAN Notices, 45(1):445-456, 2010.
-
(2010)
ACM SIGPLAN Notices
, vol.45
, Issue.1
, pp. 445-456
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
-
23
-
-
38649141810
-
Automated Cerification of Selected Equivalences for Security Protocols
-
B. Blanchet, M. Abadi, and C. Fournet. Automated Cerification of Selected Equivalences for Security Protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008.
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
24
-
-
79751527812
-
Batch Groth-Sahai
-
Springer-Verlag
-
O. Blazy, G. Fuchsbauer, M. Izabachène, A. Jambert, H. Sibert, and D. Vergnaud. Batch Groth-Sahai. In Proc. International Conference on Applied Cryptography and Network Security (ACNS'10), volume 6123 of Lecture Notes in Computer Science, pages 218-235. Springer-Verlag, 2010.
-
(2010)
Proc. International Conference on Applied Cryptography and Network Security (ACNS'10), volume 6123 of Lecture Notes in Computer Science
, pp. 218-235
-
-
Blazy, O.1
Fuchsbauer, G.2
Izabachène, M.3
Jambert, A.4
Sibert, H.5
Vergnaud, D.6
-
25
-
-
80052494019
-
Consumable Credentials in Linear-Logic-Based Access-Control Systems
-
Internet Society
-
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter. Consumable Credentials in Linear-Logic-Based Access-Control Systems. In Proc. Network and Distributed System Security Symposium (NDSS'07). Internet Society, 2007.
-
(2007)
Proc. Network and Distributed System Security Symposium (NDSS'07)
-
-
Bowers, K. D.1
Bauer, L.2
Garg, D.3
Pfenning, F.4
Reiter, M. K.5
-
26
-
-
14844295011
-
Direct Anonymous Attestation
-
ACM Press
-
E. Brickell, J. Camenisch, and L. Chen. Direct Anonymous Attestation. In CCS'04, pages 132-145. ACM Press, 2004.
-
(2004)
CCS'04
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
28
-
-
85180796294
-
England Riots: Pair Jailed for Four Years for Using Facebook to Incite Disorder
-
H. Carter. England Riots: Pair Jailed for Four Years for Using Facebook to Incite Disorder. Guardian, 2011. http://www.guardian.co.uk/uk/2011/aug/16/uk-riots-four-years-disorder-facebook.
-
(2011)
Guardian
-
-
Carter, H.1
-
30
-
-
85016672373
-
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
-
Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Proc. Advances in Cryptology (CRYPTO'94), volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer-Verlag, 1994.
-
(1994)
Proc. Advances in Cryptology (CRYPTO'94), volume 839 of Lecture Notes in Computer Science
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
31
-
-
84936943868
-
-
A. De Caro. jPBC Library. http://libeccio.dia. unisa.it/projects/jpbc/download.html.
-
jPBC Library
-
-
De Caro, A.1
-
32
-
-
84867167943
-
Binder, a Logic-Based Security Language
-
IEEE Computer Society Press
-
J. DeTreville. Binder, a Logic-Based Security Language. In Proc. IEEE Symposium on Security & Privacy (S&P'02), pages 105-113. IEEE Computer Society Press, 2002.
-
(2002)
Proc. IEEE Symposium on Security & Privacy (S&P'02)
, pp. 105-113
-
-
DeTreville, J.1
-
34
-
-
77955354815
-
Iranian Crackdown Goes Global
-
F. Fassihi. Iranian Crackdown Goes Global. The Wall Street Journal, 2009. http://online.wsj.com/article/SB125978649644673331.html.
-
(2009)
The Wall Street Journal
-
-
Fassihi, F.1
-
35
-
-
85180786290
-
-
L'Espresso
-
G. Florian. La Polizia ci Spia su Facebook. L'Espresso, 2010. http://espresso. repubblica.it/dettaglio/la-polizia-ci-spia-su-facebook/2137277.
-
(2010)
La Polizia ci Spia su Facebook
-
-
Florian, G.1
-
37
-
-
33748485156
-
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
-
K. Frikken, M. Atallah, and J. Li. Attribute-Based Access Control with Hidden Policies and Hidden Credentials. IEEE Transactions on Computers, 55(10):1259-1270, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
39
-
-
84976832950
-
Proofs that yield nothing but their validity or all languages in NP have zeroknowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zeroknowledge proof systems. JACM, 38(3):690-728, 1991.
-
(1991)
JACM
, vol.38
, Issue.3
, pp. 690-728
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
41
-
-
85180813695
-
DKAL: Distributed-Knowledge Authorization Language
-
Y. Gurevich and I. Neeman. DKAL: Distributed-Knowledge Authorization Language. In CSF'08. IEEE, 2008.
-
(2008)
CSF'08. IEEE
-
-
Gurevich, Y.1
Neeman, I.2
-
43
-
-
67650021824
-
AURA: A Programming Language for Authorization and Audit
-
L. Jia, J. A. Vaughan, K. Mazurak, J. Zhao, L. Zarko, J. Schorr, and S. Zdancewic. AURA: A Programming Language for Authorization and Audit. ACM SIGPLAN Notices, 43(9):27-38, 2008.
-
(2008)
ACM SIGPLAN Notices
, vol.43
, Issue.9
, pp. 27-38
-
-
Jia, L.1
Vaughan, J. A.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
44
-
-
84976834054
-
Authentication in Distributed Systems: Theory and Practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems, 10:265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
45
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
ACM Press
-
J. Li, N. Li, and W. H. Winsborough. Automated trust negotiation using cryptographic credentials. In Proceedings of the 12th ACM conference on Computer and communications security, CCS'05, pages 46-57. ACM Press, 2005.
-
(2005)
Proceedings of the 12th ACM conference on Computer and communications security, CCS'05
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W. H.3
-
47
-
-
51649110861
-
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
-
L. Lu, J. Han, Y. Liu, L. Hu, J.-P. Huai, L. Ni, and J. Ma. Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. IEEE Trans. on Parallel Distributed Systems, 19(10):1325-1337, 2008.
-
(2008)
IEEE Trans. on Parallel Distributed Systems
, vol.19
, Issue.10
, pp. 1325-1337
-
-
Lu, L.1
Han, J.2
Liu, Y.3
Hu, L.4
Huai, J.-P.5
Ni, L.6
Ma, J.7
-
49
-
-
85076310416
-
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
-
S. Meiklejohn, C. C. Erway, A. Küpçü, T. Hinkle, and A. Lysyanskaya. ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. In Proc. USENIX Security Symposium (USENIX'10), pages 193-206, 2010.
-
(2010)
Proc. USENIX Security Symposium (USENIX'10)
, pp. 193-206
-
-
Meiklejohn, S.1
Erway, C. C.2
Küpçü, A.3
Hinkle, T.4
Lysyanskaya, A.5
-
50
-
-
85180622008
-
Foreign Policy: Iran's Terrifying Facebook Police
-
E. Morozov. Foreign Policy: Iran's Terrifying Facebook Police. National Public Radio, 2009. http://www.npr.org/templates/story/story.php?storyId=106535773.
-
(2009)
National Public Radio
-
-
Morozov, E.1
-
51
-
-
78650837743
-
Cloud computing privacy concerns on our doorstep
-
M. D. Ryan. Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54:36-38, 2011.
-
(2011)
Communications of the ACM
, vol.54
, pp. 36-38
-
-
Ryan, M. D.1
-
52
-
-
79952161645
-
-
Technical Report MSR-TR-2010-149, Microsoft Research
-
N. Swamy, J. Chen, C. Fournet, K. Bharagavan, and J. Yang. Security Programming with Refinement Types and Mobile Proofs. Technical Report MSR-TR-2010-149, Microsoft Research, 2010.
-
(2010)
Security Programming with Refinement Types and Mobile Proofs
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Bharagavan, K.4
Yang, J.5
-
53
-
-
85180750979
-
-
The National Institute of Standards and Technology. NIST SP, 800-57
-
The National Institute of Standards and Technology. Recommendataion for Key Management - Part 1: General (Revised). NIST SP, 800-57, 2011. http://csrc.nist.gov/groups/ST/toolkit/key-management.html.
-
(2011)
Recommendataion for Key Management - Part 1: General (Revised)
-
-
-
55
-
-
75649126342
-
Cairo Activists Use Facebook to Rattle Regime
-
D. Wolman. Cairo Activists Use Facebook to Rattle Regime. WIRED Magazine, 2008. http://www.wired.com/techbiz/startups/magazine/16-11/ff-facebookegypt.
-
(2008)
WIRED Magazine
-
-
Wolman, D.1
|