Search dblp for Publications

export results for "stream:streams/journals/ftsec:"

 download as .bib file

@article{DBLP:journals/ftsec/EvansKR18,
  author    = {David Evans and
               Vladimir Kolesnikov and
               Mike Rosulek},
  title     = {A Pragmatic Introduction to Secure Multi-Party Computation},
  journal   = {Found. Trends Priv. Secur.},
  volume    = {2},
  number    = {2-3},
  pages     = {70--246},
  year      = {2018},
  url       = {https://doi.org/10.1561/3300000019},
  doi       = {10.1561/3300000019},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ftsec/EvansKR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BenthallGN17,
  author    = {Sebastian Benthall and
               Seda F. G{\"{u}}rses and
               Helen Nissenbaum},
  title     = {Contextual Integrity through the Lens of Computer Science},
  journal   = {Found. Trends Priv. Secur.},
  volume    = {2},
  number    = {1},
  pages     = {1--69},
  year      = {2017},
  url       = {https://doi.org/10.1561/3300000016},
  doi       = {10.1561/3300000016},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ftsec/BenthallGN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Chatzikokolakis17,
  author    = {Konstantinos Chatzikokolakis and
               Ehab ElSalamouny and
               Catuscia Palamidessi and
               Anna Pazii},
  title     = {Methods for Location Privacy: {A} comparative overview},
  journal   = {Found. Trends Priv. Secur.},
  volume    = {1},
  number    = {4},
  pages     = {199--257},
  year      = {2017},
  url       = {https://doi.org/10.1561/3300000017},
  doi       = {10.1561/3300000017},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ftsec/Chatzikokolakis17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Tan17,
  author    = {Gang Tan},
  title     = {Principles and Implementation Techniques of Software-Based Fault Isolation},
  journal   = {Found. Trends Priv. Secur.},
  volume    = {1},
  number    = {3},
  pages     = {137--198},
  year      = {2017},
  url       = {https://doi.org/10.1561/3300000013},
  doi       = {10.1561/3300000013},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ftsec/Tan17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Blanchet16,
  author    = {Bruno Blanchet},
  title     = {Modeling and Verifying Security Protocols with the Applied Pi Calculus
               and ProVerif},
  journal   = {Found. Trends Priv. Secur.},
  volume    = {1},
  number    = {1-2},
  pages     = {1--135},
  year      = {2016},
  url       = {https://doi.org/10.1561/3300000004},
  doi       = {10.1561/3300000004},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ftsec/Blanchet16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics