Linked e-resources
Details
Table of Contents
Information Flow
Timing-Sensitive Noninterference through Composition
Quantifying vulnerability of secret generation using hyper-distributions
A Principled Approach to Tracking Information Flow in the Presence of Libraries
Secure Multi-Party Computation: Information Flow of Outputs and Game Theory
Security Protocols
Automated verification of dynamic root of trust protocols
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
On communication models when verifying equivalence properties
A survey of attacks on Ethereum smart contracts (SoK)
Security Policies
Security Analysis of Cache Replacement Policies
Model Checking Exact Cost for Attack Scenarios
Postulates for Revocation Schemes
Defense in Depth Formulation and Usage in Dynamic Access Control
Information Leakage
Compositional Synthesis of Leakage Resilient Programs
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.
Timing-Sensitive Noninterference through Composition
Quantifying vulnerability of secret generation using hyper-distributions
A Principled Approach to Tracking Information Flow in the Presence of Libraries
Secure Multi-Party Computation: Information Flow of Outputs and Game Theory
Security Protocols
Automated verification of dynamic root of trust protocols
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
On communication models when verifying equivalence properties
A survey of attacks on Ethereum smart contracts (SoK)
Security Policies
Security Analysis of Cache Replacement Policies
Model Checking Exact Cost for Attack Scenarios
Postulates for Revocation Schemes
Defense in Depth Formulation and Usage in Dynamic Access Control
Information Leakage
Compositional Synthesis of Leakage Resilient Programs
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.