


default search action
22nd CSF 2009: Port Jefferson, NY, USA
- Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3712-2

Protocol Design
- Aaron Johnson, Paul F. Syverson:

More Anonymous Onion Routing Through Trust. 3-12 - Sjouke Mauw

, Sasa Radomirovic
, Mohammad Torabi Dashti
:
Minimal Message Complexity of Asynchronous Multi-party Contract Signing. 13-25 - Phillip Rogaway, Till Stegers:

Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code. 26-39
Information Flow
- Aslan Askarov, Andrei Sabelfeld:

Tight Enforcement of Information-Release Policies for Dynamic Languages. 43-59 - J. Nathan Foster, Benjamin C. Pierce, Steve Zdancewic:

Updatable Security Views. 60-74
Web Security
- Sergio Maffeis

, Ankur Taly:
Language-Based Isolation of Untrusted JavaScript. 77-91 - Alejandro Russo

, Andrei Sabelfeld:
Securing Timeout Instructions in Web Applications. 92-106
Protocol Analysis
- Patrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun:

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. 109-123 - Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, James J. Leifer:

Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. 124-140 - Christian Cachin, Nishanth Chandran:

A Secure Cryptographic Token Interface. 141-153
Protocols I
- Ralf Küsters, Tomasz Truderung:

Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. 157-171 - Sagar Chaki, Anupam Datta:

ASPIER: An Automated Framework for Verifying Security Protocol Implementations. 172-185 - Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov:

Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities. 186-199
Authorization
- Moritz Y. Becker:

Specification and Analysis of Dynamic Authorisation Policies. 203-217 - Max I. Kanovich, Paul D. Rowe, Andre Scedrov

:
Policy Compliance in Collaborative Systems. 218-233 - Chris Hankin

, Flemming Nielson
, Hanne Riis Nielson
:
Advice from Belnap Policies. 234-247
Verification Methods
- Gilberto Filé, Roberto Vigo:

Expressive Power of Definite Clauses for Verifying Authenticity. 251-265 - Véronique Cortier, Stéphanie Delaune:

A Method for Proving Observational Equivalence. 266-276 - Najah Chridi, Mathieu Turuani, Michaël Rusinowitch:

Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. 277-289
Protocols II
- Ralf Küsters, Max Tuengerthal:

Universally Composable Symmetric Encryption. 293-307 - Michael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei:

Achieving Security Despite Compromise Using Zero-knowledge. 308-323 - Boris Köpf, Markus Dürmuth:

A Provably Secure and Efficient Countermeasure against Timing Attacks. 324-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














