L
A. Lehmann and Lohmann, N.,
“Modeling wizard for confidential Business Processes”, in
1st Joint International Workshop on Security in Business Processes (SBP), 2012.
A. Lehmann, Lohmann, N., and Wolf, K.,
“Stubborn Sets for Simple Linear Time Properties”, in
Proceedings of 33rd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2012), 2012.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A.,
“Contextual Locking for Dynamic Pushdown Networks”, in
Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
K
R. Küsters, Truderung, T., and Vogt, A.,
“Proving Coercion-Resistance of Scantegrity II”, in
Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
R. Küsters, Truderung, T., and Vogt, A.,
“A Game-Based Definition of Coercion-Resistance and its Applications”,
Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“Clash Attacks on the Verifiability of E-Voting Systems”, in
Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
R. Küsters, Truderung, T., and Graf, J.,
“A Framework for the Cryptographic Verification of Java-like Programs”, in
Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C.,
“A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs”, in
Grande Region Security and Reliability Day 2013, 2013.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M.,
“A Hybrid Approach for Proving Noninterference of Java Programs”, in
Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Müller, J., Scapin, E., and Truderung, T.,
“sElect: A Lightweight Verifiable Remote Voting System”, in
Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
O. Kunčar and Popescu, A.,
“From Types to Sets by Local Type Definitions in Higher-Order Logic”, in
Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
O. Kunčar and Popescu, A.,
“A Consistent Foundation for Isabelle/HOL”, in
Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
O. Kunčar and Popescu, A.,
“Comprehending Isabelle/HOL's Consistency”, in
Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
M. Kovács and Seidl, H.,
“Runtime Enforcement of Information Flow Security in Tree Manipulating Processes”, in
Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
B. Köpf, Mauborgne, L., and Ochoa, M.,
“Automatic Quantification of Cache Side-Channels”, in
Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
V. Klebanov, Manthey, N., and Muise, C.,
“SAT-based Analysis and Quantification of Information Flow in Programs”, in
Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
V. Klebanov, Weigl, A., and Weisbarth, J.,
“Sound Probabilistic #SAT with Projection”, in
Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
F. Kelbert and Pretschner, A.,
“Towards a Policy Enforcement Infrastructure for Distributed Usage Control”, in
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), 2012.
F. Kelbert and Pretschner, A.,
“Decentralized Distributed Data Usage Control”, in
Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
Pages