Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 5 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is C  [Clear All Filters]
2016
V. Cortier, Galindo, D., Küsters, R., Müller, J., and Truderung, T., SoK: Verifiability Notions for E-Voting Protocols, in Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P), 2016.
2015
A. Askarov, Chong, S., and Mantel, H., Hybrid Monitors for Concurrent Noninterference, in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), 2015.
2014
M. R. Clarkson, Finkbeiner, B., Koleini, M., Micinski, K. K., Rabe, M. N., and Sánchez, C., Temporal Logics for Hyperproperties, in Proceedings of the 3rd Conference on Principles of Security and Trust (POST 2014), 2014.
2012
J. Cúellar, Ochoa, M., and Rios, R., Indistinguishable regions in Geographic Location Privacy, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC 2012), 2012.
M. Ochoa, Jürjens, J., and Cúellar, J., Non-interference on UML State-charts, in Proceedings of the 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), 2012.