Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Information Flow and Non-Intereference
What's the Over/Under? Probabilistic Bounds on Information Leakage
Secure Information Release in Timed Automata
Compositional Non-Interference for Concurrent Programs via Separation and Framing
The Meaning of Memory Safety
Leakage, Information Flow, and Protocols
Formal Verification of Integrity Preserving Countermeasures Against Cache Storage
Leakage and Protocol Composition in a Game-theoretic Perspective
Equivalence Properties by Typing in Cryptographic Branching Protocols
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience
Smart Contracts and Privacy
SoK: Unraveling Bitcoin Smart Contracts
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
UniTraX: Protecting Data Privacy with Discoverable Biases
Firewalls and Attack-Defense Trees
Transcompiling Firewalls
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.

Browse Subjects

Show more subjects...

Statistics

from
to
Export