Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSF
CSF 2010
Generate Citations
2010 23rd IEEE Computer Security Foundations Symposium
July 17 2010 to July 19 2010
Edinburgh
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-vii
Preface
Freely available from IEEE.
pp. viii-viii
Committees
Freely available from IEEE.
pp. ix-x
list-reviewer
Freely available from IEEE.
pp. xi-xi
Approximation and Randomization for Quantitative Information-Flow Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-14
by
Boris Köpf
,
Andrey Rybalchenko
Quantitative Information Flow - Verification Hardness and Possibilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-27
by
Hirotoshi Yasuoka
,
Tachio Terauchi
Quantification of Integrity
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-43
by
Michael R. Clarkson
,
Fred B. Schneider
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-56
by
Boris Köpf
,
Geoffrey Smith
Modeling and Verifying Ad Hoc Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-74
by
Mathilde Arnaud
,
Véronique Cortier
,
Stéphanie Delaune
Formal Verification of Privacy for RFID Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-88
by
Mayla Brusó
,
Konstantinos Chatzikokolakis
,
Jerry den Hartog
Robustness Guarantees for Anonymity
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-106
by
Gilles Barthe
,
Alejandro Hevia
,
Zhengqin Luo
,
Tamara Rezk
,
Bogdan Warinschi
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-121
by
Myrto Arapinis
,
Tom Chothia
,
Eike Ritter
,
Mark Ryan
A Game-Based Definition of Coercion-Resistance and Its Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-136
by
Ralf Küsters
,
Tomasz Truderung
,
Andreas Vogt
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-153
by
Adam J. Lee
,
Ting Yu
Constraining Credential Usage in Logic-Based Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-168
by
Lujo Bauer
,
Limin Jia
,
Divya Sharma
Information Flow in Credential Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-185
by
Moritz Y. Becker
Dynamic vs. Static Flow-Sensitive Security Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-199
by
Alejandro Russo
,
Andrei Sabelfeld
Information Flow Monitor Inlining
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-214
by
Andrey Chudnov
,
David A. Naumann
Required Information Release
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-227
by
Stephen Chong
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-245
by
Simon Meier
,
Cas Cremers
,
David Basin
A Machine-Checked Formalization of Sigma-Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-260
by
Gilles Barthe
,
Daniel Hedin
,
Santiago Zanella Béguelin
,
Benjamin Grégoire
,
Sylvain Heraud
Impossibility Results for Secret Establishment
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-273
by
Benedikt Schmidt
,
Patrick Schaller
,
David Basin
A Framework for the Sound Specification of Cryptographic Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-289
by
Juan A. Garay
,
Aggelos Kiayias
,
Hong-Sheng Zhou
Towards a Formal Foundation of Web Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-304
by
Devdatta Akhawe
,
Adam Barth
,
Peifung E. Lam
,
John Mitchell
,
Dawn Song
Automating Open Bisimulation Checking for the Spi Calculus
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-321
by
Alwen Tiu
,
Jeremy Dawson
Protocol Composition for Arbitrary Primitives
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-336
by
Stefan Ciobâca
,
Véronique Cortier
On Protection by Layout Randomization
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-351
by
Martín Abadi
,
Gordon Plotkin
Author index
Freely available from IEEE.
pp. 353-353
[Publisher's information]
Freely available from IEEE.
pp. 354-354
Showing 32 out of 32