


default search action
37th CSF 2024: Enschede, Netherlands
- 37th IEEE Computer Security Foundations Symposium, CSF 2024, Enschede, Netherlands, July 8-12, 2024. IEEE 2024, ISBN 979-8-3503-6203-9

- Fortunat Rajaona

, Ioana Boureanu
, R. Ramanujam, Stephan Wesemeyer:
Epistemic Model Checking for Privacy. 1-16 - Elena Andreeva, Rishiraj Bhattacharyya

, Arnab Roy
, Stefano Trevisani
:
On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing. 1-16 - Sergiu Bursuc, Reynaldo Gil Pons

, Sjouke Mauw, Rolando Trujillo-Rasua:
Software-Based Memory Erasure with Relaxed Isolation Requirements. 1-16 - R. Ramanujam, Vaishnavi Sundararajan, S. P. Suresh:

Solving the Insecurity Problem for Assertions. 1-15 - Karima Makhlouf, Tamara Stefanovic

, Héber Hwang Arcolezi, Catuscia Palamidessi:
A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results. 1-16 - Laouen Fernet

, Sebastian Mödersheim
, Luca Viganò:
A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of Transitions. 17-32 - Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi

, Aniket Kate:
Divide and Funnel: A Scaling Technique for Mix-Networks. 49-64 - Nabarun Deka, Minjian Zhang, Rohit Chadha, Mahesh Viswanathan:

Deciding Branching Hyperproperties for Real Time Systems. 65-79 - Ugo Dal Lago, Davide Davoli, Bruce M. Kapron:

On Separation Logic, Computational Independence, and Pseudorandomness. 80-95 - Atalay Mert Ileri

, Nickolai Zeldovich, Adam Chlipala, M. Frans Kaashoek:
Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism. 96-111 - Alfredo Capozucca, Maximiliano Cristiá, Ross Horne, Ricardo Katz:

Brewer-Nash Scrutinised: Mechanised Checking of Policies Featuring Write Revocation. 112-126 - Francesco D'Amato, Luca Zanolini:

Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony Resilience. 127-142 - Christian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell

, Vassilis Zikas:
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy. 143-158 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu

:
Modeling Mobile Crash in Byzantine Consensus. 159-171 - Wenhui Qiao, Liang Feng Zhang:

A Maintainable Matrix Commitment Scheme with Constant-Size Public Parameters and Incremental Aggregation. 172-185 - Véronique Cortier, Pierrick Gaudry, Quentin Yang:

Is the JCJ voting system really coercion-resistant? 186-200 - Mike Graf

, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach:
Accountable Bulletin Boards: Definition and Provably Secure Implementation. 201-216 - Prashant Agrawal, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee:

Publicly Auditable Privacy-Preserving Electoral Rolls. 217-232 - Matteo Busi

, Riccardo Focardi, Flaminia L. Luccio:
Bridging the Gap: Automated Analysis of Sancus. 233-248 - Markus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Magdalena Solitro, Matteo Maffei:

Wappler: Sound Reachability Analysis for WebAssembly. 249-264 - Robert Künnemann, Marco Patrignani

, Ethan Cecchetti
:
Computationally Bounded Robust Compilation and Universally Composable Security. 265-278 - Bruno Blanchet, Pierre Boutry, Christian Doczkal, Benjamin Grégoire, Pierre-Yves Strub:

CV2EC: Getting the Best of Both Worlds. 279-294 - Manning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang:

Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE. 311-323 - David Baelde, Caroline Fontaine, Adrien Koutsos

, Guillaume Scerri, Théo Vignon:
A Probabilistic Logic for Concrete Security. 324-339 - Matvey Soloviev, Musard Balliu, Roberto Guanciale:

Security Properties through the Lens of Modal Logic. 340-355 - Aaron D. Jaggard, Paul Syverson, Catherine Meadows:

A Logic of Sattestation. 356-371 - Dan Bogdanov, Joosep Jääger, Peeter Laud, Härmel Nestra, Martin Pettai, Jaak Randmets, Raul-Martin Rebane, Ville Sokk, Kert Tali, Sandhra-Mirella Valdma:

ZK-SecreC: a Domain-Specific Language for Zero-Knowledge Proofs. 372-387 - Amir M. Ahmadian

, Matvey Soloviev, Musard Balliu:
Disjunctive Policies for Database-Backed Programs. 388-402 - Brijesh Dongol

, Matt Griffin, Andrei Popescu
, Jamie Wright:
Relative Security: Formally Modeling and (Dis)Proving Resilience Against Semantic Optimization Vulnerabilities. 403-418 - Natasha Fernandes

, Annabelle McIver
, Parastoo Sadeghi:
Explaining ∊ in Local Differential Privacy Through the Lens of Quantitative Information Flow. 419-432 - Cosku Acay, Joshua Gancher, Rolph Recto, Andrew C. Myers:

Secure Synthesis of Distributed Cryptographic Applications. 433-448 - Lisa Oakley, Steven Holtzen, Alina Oprea:

Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting. 449-463 - Barbara Fila, Sasa Radomirovic

:
Nothing is Out-of-Band: Formal Modeling of Ceremonies. 464-478 - Bruno Blanchet:

Dealing with Dynamic Key Compromise in Crypto Verif. 495-510 - Katharina Kreuzer

:
Verification of Correctness and Security Properties for CRYSTALS-KYBER. 511-526 - Behzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher

, Daniel Slamanig:
Circuit-Succinct Universally-Composable NIZKs with Updatable CRS. 527-542 - Bruno Blanchet, Charlie Jacomme:

Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-Exchanges. 543-556 - Zhenkai Hu, Kang Yang, Yu Yu:

Unconditionally Secure MPC for Boolean Circuits With Constant Online Communication. 557-572 - Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling:

UniHand: Privacy-Preserving Universal Handover for Small-Cell Networks in 5G-Enabled Mobile Communication with KCI Resilience. 573-588 - Pedram Hosseyni, Ralf Küsters, Tim Würtele:

Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. 589-604 - Azucena Garvía Bosshard, Jonathan Bootle

, Christoph Sprenger:
Formal Verification of the Sumcheck Protocol. 605-619 - Dennis Dayanikli

, Anja Lehmann:
Provable Security Analysis of the Secure Remote Password Protocol. 620-635 - Zoltán Ádám Mann:

Urgency in Cybersecurity Risk Management: Toward a Solid Theory. 651-664 - Milan Lopuhaä-Zwakenberg

:
Attack Tree Metrics are Operad Algebras. 665-679 - Patricia Guerra-Balboa

, Àlex Miranda-Pascual
, Javier Parra-Arnau, Thorsten Strufe:
Composition in Differential Privacy for General Granularity Notions. 680-696

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














