Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 147 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
A. Lehmann and Lohmann, N., Model support for confidential service-oriented business processes, in Proceedings of the 4th Central-European Workshop on Services and their Composition (ZEUS 2012), Bamberg, Germany, 2012.
A. Lehmann and Fahland, D., Information Flow Security for Business Process Models - just one click away, in Proceedings of the 10th International Conference on Business Process Management - Demo Track (BPM 2012), 2012.
P. Lammich, Müller-Olm, M., Seidl, H., and Wenner, A., Contextual Locking for Dynamic Pushdown Networks, in Proceedings of the 20th International Symposium on Static Analysis (SAS 2013), 2013.
K
R. Küsters, Truderung, T., and Vogt, A., Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, in Proceedings of the 32nd IEEE Symposium on Security and Privacy (S{&}P 2011), 2011.
R. Küsters, Scapin, E., Truderung, T., and Graf, J., Extending and Applying a Framework for the Cryptographic Verification of Java Programs, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Graf, J., and Scheben, C., A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs, in Grande Region Security and Reliability Day 2013, 2013.
R. Küsters, Truderung, T., and Vogt, A., Proving Coercion-Resistance of Scantegrity II, in Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
R. Küsters, Müller, J., Scapin, E., and Truderung, T., sElect: A Lightweight Verifiable Remote Voting System, in Proceedings of the 29th IEEE Computer Security Foundations Symposium (CSF), 2016.
R. Küsters, Truderung, T., and Vogt, A., Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking, in Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P 2014), 2014.
R. Küsters, Truderung, T., and Graf, J., A Framework for the Cryptographic Verification of Java-like Programs, in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF 2012), 2012.
R. Küsters, Truderung, T., Beckert, B., Bruns, D., Kirsten, M., and Mohr, M., A Hybrid Approach for Proving Noninterference of Java Programs, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
R. Küsters, Truderung, T., and Vogt, A., Clash Attacks on the Verifiability of E-Voting Systems, in Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A., A Game-Based Definition of Coercion-Resistance and its Applications, Journal of Computer Security (special issue of selected CSF 2010 papers), vol. 20, 2012.
O. Kunčar and Popescu, A., Comprehending Isabelle/HOL's Consistency, in Proceedings of the 26th European Symposium on Programming (ESOP), 2017.
O. Kunčar and Popescu, A., A Consistent Foundation for Isabelle/HOL, in Proceedings of the 6th International Conference on Interactive Theorem Proving (ITP), 2015.
O. Kunčar and Popescu, A., From Types to Sets by Local Type Definitions in Higher-Order Logic, in Proceedings of the 7th International Conference on Interactive Theorem Proving (ITP), 2016.
P. Kumari, Pretschner, A., Peschla, J., and Kuhn, J. - M., Distributed Data Usage Control for Web Applications: A Social Network Implementation, in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), 2011.
M. Kovács, Seidl, H., and Finkbeiner, B., Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties, in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.
M. Kovács and Seidl, H., Runtime Enforcement of Information Flow Security in Tree Manipulating Processes, in Proceedings of the 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 2012.
B. Köpf, Mauborgne, L., and Ochoa, M., Automatic Quantification of Cache Side-Channels, in Proceedings of the 24th International Conference on Computer Aided Verification (CAV 2012), 2012.
V. Klebanov, Precise Quantitative Information Flow Analysis – A Symbolic Approach, Theoretical Computer Science, 2014.
V. Klebanov, Weigl, A., and Weisbarth, J., Sound Probabilistic #SAT with Projection, in Proceedings of the 14th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL), 2016.
V. Klebanov, Manthey, N., and Muise, C., SAT-based Analysis and Quantification of Information Flow in Programs, in Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST 2013), 2013.
F. Kelbert and Pretschner, A., A Fully Decentralized Data Usage Control Enforcement Infrastructure, in Proceedings of the 13th International Conference on Applied Cryptography and Network Security, 2015.
F. Kelbert and Pretschner, A., Decentralized Distributed Data Usage Control, in Proceedings of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.

Pages