Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSF
CSF 2012
Generate Citations
2012 IEEE 25th Computer Security Foundations Symposium
June 25 2012 to June 27 2012
Cambridge, MA USA
ISSN: 1063-6900
ISBN: 978-0-7695-4718-3
Table of Contents
Papers
[Title page i]
Freely available from IEEE.
pp. i
Papers
[Title page iii]
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Preface - CSF 2012
Freely available from IEEE.
pp. viii-viii
by
Stephen Chong
Papers
Committees
Freely available from IEEE.
pp. ix-x
Papers
External reviewers
Freely available from IEEE.
pp. xi
Papers
Information-Flow Security for a Core of JavaScript
Freely available from IEEE.
pp. 3-18
by
D. Hedin
,
A. Sabelfeld
Papers
Secure Information Flow for Concurrent Programs under Total Store Order
Freely available from IEEE.
pp. 19-29
by
J. A. Vaughan
,
T. Millstein
Papers
ENCoVer: Symbolic Exploration for Information Flow Security
Freely available from IEEE.
pp. 30-44
by
M. Balliu
,
M. Dam
,
Gurvan Le Guernic
Papers
Information-Flow Control for Programming on Encrypted Data
Freely available from IEEE.
pp. 45-60
by
J. C. Mitchell
,
R. Sharma
,
D. Stefan
,
J. Zimmerman
Papers
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
Freely available from IEEE.
pp. 63-77
by
A. Pankova
,
P. Laud
Papers
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
Freely available from IEEE.
pp. 78-94
by
B. Schmidt
,
S. Meier
,
C. Cremers
,
D. Basin
Papers
Verifying Privacy-Type Properties in a Modular Way
Freely available from IEEE.
pp. 95-109
by
M. Arapinis
,
V. Cheval
,
S. Delaune
Papers
Security Analysis of Role-Based Access Control through Program Verification
Freely available from IEEE.
pp. 113-125
by
A. L. Ferrara
,
P. Madhusudan
,
G. Parlato
Papers
Gran: Model Checking Grsecurity RBAC Policies
Freely available from IEEE.
pp. 126-138
by
M. Bugliesi
,
S. Calzavara
,
R. Focardi
,
M. Squarcina
Papers
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction
Freely available from IEEE.
pp. 139-153
by
V. Genovese
,
D. Garg
,
D. Rispoli
Papers
Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication
Freely available from IEEE.
pp. 157-170
by
Zhengqin Luo
,
T. Rezk
Papers
Secure Compilation to Modern Processors
Freely available from IEEE.
pp. 171-185
by
P. Agten
,
R. Strackx
,
B. Jacobs
,
F. Piessens
Papers
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization
Freely available from IEEE.
pp. 186-197
by
G. Barthe
,
G. Betarte
,
J. D. Campo
,
C. Luna
Papers
A Framework for the Cryptographic Verification of Java-Like Programs
Freely available from IEEE.
pp. 198-212
by
R. Kusters
,
T. Truderung
,
J. Graf
Papers
Constructing Optimistic Multi-party Contract Signing Protocols
Freely available from IEEE.
pp. 215-229
by
B. Kordy
,
S. Radomirovic
Papers
Refining Key Establishment
Freely available from IEEE.
pp. 230-246
by
C. Sprenger
,
D. Basin
Papers
Discovering Concrete Attacks on Website Authorization by Formal Analysis
Freely available from IEEE.
pp. 247-262
by
C. Bansal
,
K. Bhargavan
,
S. Maffeis
Papers
Measuring Information Leakage Using Generalized Gain Functions
Freely available from IEEE.
pp. 265-279
by
M. S. Alvim
,
K. Chatzikokolakis
,
C. Palamidessi
,
G. Smith
Papers
The Thermodynamics of Confidentiality
Freely available from IEEE.
pp. 280-290
by
P. Malacaria
,
F. Smeraldi
Papers
Securing Interactive Programs
Freely available from IEEE.
pp. 293-307
by
W. Rafnsson
,
D. Hedin
,
A. Sabelfeld
Papers
Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies
Freely available from IEEE.
pp. 308-322
by
A. Askarov
,
S. Chong
Papers
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Freely available from IEEE.
pp. 325-339
by
B. Blanchet
Papers
Generic Indifferentiability Proofs of Hash Designs
Freely available from IEEE.
pp. 340-353
by
M. Daubignard
,
P. Fouque
,
Y. Lakhnech
Papers
Verified Security of Merkle-Damgård
Freely available from IEEE.
pp. 354-368
by
M. Backes
,
G. Barthe
,
M. Berg
,
B. Gregoire
,
C. Kunz
,
M. Skoruppa
,
S. Z. Beguelin
Papers
Provably Secure and Practical Onion Routing
Freely available from IEEE.
pp. 369-385
by
M. Backes
,
I. Goldberg
,
A. Kate
,
E. Mohammadi
Papers
Author index
Freely available from IEEE.
pp. 387
Papers
[Publisher's information]
Freely available from IEEE.
pp. 388
Showing 34 out of 34