Default Cover Image

2010 23rd IEEE Computer Security Foundations Symposium

July 17 2010 to July 19 2010

Edinburgh

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-vii
PrefaceFreely available from IEEE.pp. viii-viii
CommitteesFreely available from IEEE.pp. ix-x
list-reviewerFreely available from IEEE.pp. xi-xi
Approximation and Randomization for Quantitative Information-Flow AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 3-14
Quantitative Information Flow - Verification Hardness and PossibilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 15-27
Quantification of IntegrityFull-text access may be available. Sign in or learn about subscription options.pp. 28-43
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 44-56
Modeling and Verifying Ad Hoc Routing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 59-74
Formal Verification of Privacy for RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 75-88
Robustness Guarantees for AnonymityFull-text access may be available. Sign in or learn about subscription options.pp. 91-106
Analysing Unlinkability and Anonymity Using the Applied Pi CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 107-121
A Game-Based Definition of Coercion-Resistance and Its ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 122-136
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 139-153
Constraining Credential Usage in Logic-Based Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 154-168
Information Flow in Credential SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 171-185
Dynamic vs. Static Flow-Sensitive Security AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 186-199
Information Flow Monitor InliningFull-text access may be available. Sign in or learn about subscription options.pp. 200-214
Required Information ReleaseFull-text access may be available. Sign in or learn about subscription options.pp. 215-227
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security ProofsFull-text access may be available. Sign in or learn about subscription options.pp. 231-245
A Machine-Checked Formalization of Sigma-ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 246-260
Impossibility Results for Secret EstablishmentFull-text access may be available. Sign in or learn about subscription options.pp. 261-273
A Framework for the Sound Specification of Cryptographic TasksFull-text access may be available. Sign in or learn about subscription options.pp. 277-289
Towards a Formal Foundation of Web SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 290-304
Automating Open Bisimulation Checking for the Spi CalculusFull-text access may be available. Sign in or learn about subscription options.pp. 307-321
Protocol Composition for Arbitrary PrimitivesFull-text access may be available. Sign in or learn about subscription options.pp. 322-336
On Protection by Layout RandomizationFull-text access may be available. Sign in or learn about subscription options.pp. 337-351
Author indexFreely available from IEEE.pp. 353-353
[Publisher's information]Freely available from IEEE.pp. 354-354
Showing 32 out of 32