Year: 2017 (Total: 11)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#190 Identifying Personal DNA Methylation Profiles by Genotype Inference

Proceedings of the 38th IEEE Symposium on Security and Privacy (S&P) , 2017

Network and Distributed System Security Symposium [NDSS]

#189 Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

#188 Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) , 2017

IEEE European Symposium on Security and Privacy [Euro S&P]

#187 LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#186 ARTist: The Android Runtime Instrumentation and Security Toolkit

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#185 Efficient and Flexible Discovery of PHP Application Vulnerabilities

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

#184 A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17) , 2017

Others

#183 Quantifying Location Sociality

Proceedings of the 28th ACM Conference on Hypertext and Social Media (HT'17) , 2017

#182 DeepCity: A Feature Learning Framework for Mining Location Check-ins

Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) , 2017

#181 [To appear] How Internet Resources Might Be Helping You Develop Faster but Less Securely

IEEE Security & Privacy (Journal) , 2017

#180 Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals

Proc. of the 26rd International Conference on World Wide Web (WWW 2017) , 2017

Year: 2016 (Total: 32)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#179 SoK: Lessons Learned From Android Security Research For Appified Software Platforms

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

#178 You Get Where You're Looking For: The Impact Of Information Sources On Code Security

37th IEEE Symposium on Security and Privacy (S&P '16) , 2016

ACM Conference on Computer and Communications Security [CCS]

#177 Computational Soundness of Dalvik Bytecode

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16) , 2016

#176 Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

#175 Membership Privacy in MicroRNA-based Studies

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#174 Identifying the Scan and Attack Infrastructures behind Amplification DDoS attacks

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

#173 Reliable Third-Party Library Detection in Android and its Security Applications

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16) , 2016

Usenix Security Symposium [Usenix]

#172 An Empirical Study of Textual Key-Fingerprint Representations

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#171 Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#170 Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#169 On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

#168 What Cannot be Read, Cannot be Leveraged? Revisiting Assumptions of JIT-ROP Defenses

Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) , 2016

Network and Distributed System Security Symposium [NDSS]

#167 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Proceedings of the 23rd Annual Symposium on Network and Distributed System Security (NDSS '16) , 2016

Others

#166 Automated analysis of security protocols with global state

Journal of Computer Security (Journal) , 2016

#165 Adversarial Perturbations Against Deep Neural Networks for Malware Classification

The Computing Research Repository (CoRR) (Journal) , 2016

#164 Simulating the Large-Scale Erosion of Genomic Privacy Over Time

Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16) , 2016

#163 Profile Linkability despite Anonymity in Social Media Systems

Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society (WPES) , 2016

#162 On the Feasibility of TTL-based Filtering for DRDoS Mitigation

RAID 2016, 19th International Symposium on Research in Attacks, Intrusions and Defenses , 2016

#161 A Survey on Routing in Anonymous Communication Protocols

The Computing Research Repository (CoRR) (Journal) , 2016

#160 VatiCAN - Vetted, Authenticated CAN Bus

Conference on Cryptographic Hardware and Embedded Systems (CHES) (Journal) , 2016

#159 Kizzle: A Signature Compiler for Detecting Exploit Kits

The 46th Annual IEEE/IFIP Conference on Dependable Systems and Networks , 2016

#158 Boxify: Bringing Full-Fledged App Sandboxing to Stock Android

USENIX ;login: (Journal) , 2016

#157 R-Droid: Leveraging Android App Analysis with Static Slice Optimization

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security , 2016

#156 RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , 2016

#155 Implementation-level Analysis of the JavaScript Helios Voting Client

Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016 , 2016

#154 Nearly Optimal Verifiable Data Streaming

IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC) (Journal) , 2016

#153 Anonymous RAM

21st European Symposium on Research in Computer Security (ESORICS) , 2016

#152 From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy

Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 Tutorial Lectures , 2016

#151 Delegatable Functional Signatures

Public-Key Cryptography - PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I , 2016

#150 Establishing mandatory access control on Android OS

, 2016

#149 Autonome Systeme

Datenschutz und Datensicherheit (Journal) , 2016

#148 POSTER: The ART of App Compartmentalization

Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ) , 2016

Year: 2015 (Total: 18)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#147 ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data

Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , 2015

ACM Conference on Computer and Communications Security [CCS]

#146 POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#145 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)

Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15) , 2015

#144 Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , 2015

Usenix Security Symposium [Usenix]

#143 Boxify: Full-fledged App Sandboxing for Stock Android

Proceedings of the 24th USENIX Security Symposium (USENIX '15) , 2015

IEEE Computer Security Foundations Symposium [CSF]

#142 Symbolic Malleable Zero-knowledge Proofs

Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF '15) , 2015

Others

#141 Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks

Proceedings on Privacy Enhancing Technologies , 2015

#140 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

13th International Conference on Applied Cryptography and Network Security (ACNS) , 2015

#139 PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

Proceedings of the 4th Conference on Principles of Security and Trust (POST) , 2015

#138 How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

CoRR (Journal) , 2015

#137 Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

ACM ASIACCS Security in Cloud Computing Workshop 2015 , 2015

#136 Data Lineage in Malicious Environments

IEEE Transactions on Dependable and Secure Computing (Journal) , 2015

#135 Quantifying Information Flow in Cryptographic Systems

Mathematical Structures in Computer Science (Journal) , 2015

#134 Achieving Optimal Utility for Distributed Differential Privacy Using SMPC

Applications of Secure Multiparty Computation , 2015

#133 Computational Soundness for Interactive Primitves

Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15) , 2015

#132 Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources

Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS'15) , 2015

#131 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

CoRR (Journal) , 2015

#130 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

IACR Cryptology ePrint Archive (Journal) , 2015

Year: 2014 (Total: 18)

ACM Conference on Computer and Communications Security [CCS]

#129 (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#128 Poster: Quasi-ID: In fact, I am a human

Proceedings of the 21st ACM Conference on Computer and Communications Security (ACM CCS '14) , 2014

#127 You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

Proceedings of the 21st ACM conference on Computer and Communications Security (ACM CCS '14) , 2014

Usenix Security Symposium [Usenix]

#126 Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing

Proceedings of the 23rd USENIX Security Symposium (USENIX '14) , 2014

IEEE Computer Security Foundations Symposium [CSF]

#125 TUC: Time-sensitive and Modular Analysis of Anonymous Communication

Proceedings of the of the 27th IEEE Computer Security Foundations Symposium (CSF '14) , 2014

Others

#124 Android Security Framework: Extensible Multi-Layered Access Control on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#123 Scippa: System-Centric IPC Provenance on Android

In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14) , 2014

#122 Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis

, 2014

#121 Lime: Data Lineage in the Malicious Environment

Proceedings of 10th International Workshopon Security and Trust Management (STM) , 2014

#120 Asynchronous MPC with a Strict Honest Majority Using Non-equivocation

ACM Symposium on Principles of Distributed Computing 2014 , 2014

#119 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , 2014

#118 BackRef: Accountability in Anonymous Communication Networks

Applied Cryptography and Network Security , 2014

#117 X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.

29th ACM Symposium on Applied Computing (SAC 2014) , 2014

#116 Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity

Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , 2014

#115 Differentially Private Data Aggregation with Optimal Utility

30th Annual Computer Security Applications Conference (ACSAC) , 2014

#114 Declarative Design and Enforcement for Secure Cloud Applications

, 2014

#113 Differentially Private Data Aggregation with Optimal Utility

, 2014

#112 Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract

Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS , 2014

Year: 2013 (Total: 18)

ACM Conference on Computer and Communications Security [CCS]

#111 Verifiable Delegation of Computation on Outsourced Data

Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '11) , 2013

Network and Distributed System Security Symposium [NDSS]

#110 Preventing Side-Channel Leaks in Web Traffic: A Formal Approach

Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS '13) , 2013

IEEE Computer Security Foundations Symposium [CSF]

#109 AnoA: A Framework For Analyzing Anonymous Communication Protocols

Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF '13) , 2013

Others

#108 Using Mobile Device Communication to Strengthen e-Voting Protocols

Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013 , 2013

#107 AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications

8th International Workshop on Data Privacy Management (DPM'13) , 2013

#106 Differentially Private Smart Metering with Battery Recharging

Proceedings of the 8th International Workshop on Data Privacy Managemant (DPM 2013) , 2013

#105 Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

Principles of Security and Trust 2013 , 2013

#104 Asynchronous Computational VSS with Reduced Communication Complexity

Proc. of the 2013 Cryptographers' Track at the RSA Conference (CT-RSA 2013) , 2013

#103 AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications

, 2013

#102 AppGuard - Enforcing User Requirements on Android Apps

19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , 2013

#101 Privacy-Preserving Accountable Computation

Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , 2013

#100 Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations

Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo (Journal) , 2013

#99 Callee-site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

#98 Client-controlled Cryptography-as-a-Service in the Cloud

11th International Conference on Applied Cryptography and Network Security (ACNS'13) , 2013

#97 Gadge Me if You Can: Secure and Efficient Ad-Hoc Instruction-Level Randomization for x86 and ARM

8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) , 2013

#96 AnoA: A Framework for Analyzing Anonymous Communication Protocols

6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs) , 2013

#95 Formal Verification of Cryptographic Security Proofs

, 2013

#94 Idea: Callee-Site Rewriting of Sealed System Libraries

International Symposium on Engineering Secure Software and Systems (ESSoS'13) , 2013

Year: 2012 (Total: 16)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#93 ObliviAd: Provably Secure and Practical Online Behavioral Advertising

Proceedings of the 33rd IEEE Symposium on Security and Privacy 2012 (Oakland 2012) , 2012

ACM Conference on Computer and Communications Security [CCS]

#92 Computational Soundness without Protocol Restrictions

Proceedings of the 19th ACM Conference on Computer and Communication Security (CCS '12) , 2012

Network and Distributed System Security Symposium [NDSS]

#91 Automated Synthesis of Secure Distributed Applications

Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS '12) , 2012

#90 MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) , 2012

IEEE Computer Security Foundations Symposium [CSF]

#89 Verified Security of Merkle-Damgård

Proceedings of the 25th IEEE Computer Security Foundations Symposium - CSF 2012 , 2012

#88 Provably Secure and Practical Onion Routing

Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , 2012

Others

#87 Ace: An Efficient Key-Exchange Protocol for Onion Routing

Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , 2012

#86 Brief announcement: distributed cryptography using trinc

ACM Symposium on Principles of Distributed Computing 2012 , 2012

#85 AppGuard - Real-time Policy Enforcement for Third-Party Applications

, 2012

#84 Adding query privacy to robust DHTs

Proc. of the 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012) , 2012

#83 Diffusion-Based Image Compression in Steganography

Proceedings of the 8th International Symposium on Visual Computing -- ISVC 2012 , 2012

#82 On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols

Proc. 4th NASA Formal Methods Symposium (NFM 2012) , 2012

#81 SAFE Extensibility of Data-Driven Web Applications

WWW~'12: Proceedings of the 21st International World Wide Web Conference , 2012

#80 XIFER: A Software Diversity Tool Against Code-Reuse Attacks

4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3) , 2012

#79 Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification

Eigth Workshop on Formal and Computational Cryptography (FCC 2012) , 2012

#78 Rational Cryptography

, 2012

Year: 2011 (Total: 16)

ACM Conference on Computer and Communications Security [CCS]

#77 AmazonIA: When Elasticity Snaps Back

Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) , 2011

#76 Poster: Control-flow Integrity for Smartphones

18th ACM conference on Computer and communications security (ACM CCS 2012) , 2011

Network and Distributed System Security Symposium [NDSS]

#75 A Security API for Distributed Social Networks

Proceedings of the Network and Distributed System Security Symposium (NDSS '11) , 2011

Others

#74 Twin Clouds: An Architecture for Secure Cloud Computing

Workshop on Cryptography and Security in Clouds (CSC) , 2011

#73 Automatically Verifying Typing Constraints for a Data Processing Language

Proc. 1st International Conference on Certified Programs and Proofs (CPP 2011) , 2011

#72 A Local Cross-Site Scripting Attack against Android Phones

, 2011

#71 Cryptographically sound security proofs for basic and public-key Kerberos

International Journal of Information Security (Journal) , 2011

#70 Computational Verifiable Secret Sharing Revisited

Proc. 17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011) , 2011

#69 G2C: Cryptographic Protocols from Goal-Driven Specifications

TOSCA'11: Proceedings of the 2011 International Conference on Theory of Security and Applications (now POST), held as part of ETAPS 2011 , 2011

#68 Non-Uniform Distributions in Quantitative Information-Flow

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) , 2011

#67 Securing social networks

Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, San Jose, CA, USA, June 6-8, 2011 , 2011

#66 Union and Intersection Types for Secure Protocol Implementations

Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers , 2011

#65 X-pire! - A digital expiration date for images in social networks

CoRR (Journal) , 2011

#64 Twin Clouds: Secure Cloud Computing with Low Latency

Communications and Multimedia Security Conference (CMS'11) , 2011

#63 CFI Goes Mobile: Control-Flow Integrity for Smartphones

International Workshop on Trustworthy Embedded Devices (TrustED) (Journal) , 2011

#62 Union Intersection, and Refinement Types and Reasoning About Type Disjointness for Security Protocol Analysis

, 2011

Year: 2010 (Total: 10)

ACM Conference on Computer and Communications Security [CCS]

#61 Computationally Sound Verification of Source Code

ACM CCS 2010 , 2010

Usenix Security Symposium [Usenix]

#60 Acoustic Side-Channel Attacks of Printers

Proceedings of 19th USENIX Security Symposium , 2010

Others

#59 Anonymous Webs of Trust

Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS) , 2010

#58 Anonymity and Trust in Distributed Systems

Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) , 2010

#57 Computationally Sound Abstraction and Verification of Secure Multi-Party Computations

Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , 2010

#56 Computational Soundness of Symbolic Zero-Knowledge Proofs

Journal of Computer Security (Journal) , 2010

#55 RatFish: A File Sharing Protocol Provably Secure Against Rational Users

Proceedings of 15th European Symposium on Research in Computer Security (ESORICS) , 2010

#54 Speaker Recognition in Encrypted Voice-over-IP Traffic

Proceedings of 15th European Symposium on Research in Computer Security (ESORICS) , 2010

#53 Novel Classes of Side Channels and Covert Channels

, 2010

#52 Ray - A Secure Microkernel Architecture

Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010) , 2010

Year: 2009 (Total: 9)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#51 Automatic Discovery and Quantification of Information Leaks

Proceedings of 30th IEEE Symposium on Security and Privacy , 2009

#50 Tempest in a Teapot: Compromising Reflections Revisited

Proceedings of 30th IEEE Symposium on Security and Privacy , 2009

ACM Conference on Computer and Communications Security [CCS]

#49 CoSP: a general framework for computational soundness proofs

Proceedings of the 16th ACM conference on Computer and communications security (CCS) , 2009

Network and Distributed System Security Symposium [NDSS]

#48 CSAR: A practical and provable technique to make randomized systems accountable

NDSS 2009 , 2009

IEEE Computer Security Foundations Symposium [CSF]

#47 Achieving Security Despite Compromise Using Zero-knowledge

Proceedings of 22nd IEEE Computer Security Foundations Symposium (CSF) , 2009

Others

#46 Design and Verification of Anonymous Trust Protocols

Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers , 2009

#45 Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays

Proceedings of OTM Conferences , 2009

#44 Security of Robust Audio Hashes

First IEEE International Workshop on Information Forensics and Security (WIFS 2009) , 2009

#43 Anonymity and Censorship Resistance in Unstructured Overlay Networks

On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I , 2009

Year: 2008 (Total: 15)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#42 Compromising Reflections or How to Read LCD Monitors Around the Corner

IEEE Symposium on Security and Privacy, Proceedings of SSP'08 , 2008

#41 Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol

IEEE Symposium on Security and Privacy, Proceedings of SSP'08 , 2008

ACM Conference on Computer and Communications Security [CCS]

#40 Type-checking zero-knowledge

Proceedings of the 15th ACM conference on Computer and communications security , 2008

IEEE Computer Security Foundations Symposium [CSF]

#39 Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus

Proceedings of 21st IEEE Computer Security Foundations Symposium (CSF) , 2008

#38 Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers

21st IEEE Computer Security Foundations Symposium, CSF 2008 , 2008

Others

#37 Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten

iX Magazin für Professionelle Informationstechnik (Journal) , 2008

#36 A Formal Language for Cryptographic Pseudocode

LPAR 2008 , 2008

#35 Conditional Reactive Simulatability

International Journal of Information Security (Journal) , 2008

#34 CASPA: Causality-based Abstraction for Security Protocol Analysis

Proceedings of 20th International Conference on Computer Aided Verification (CAV) , 2008

#33 Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks

Proceedings of 13th European Symposium on Research in Computer Security (ESORICS) , 2008

#32 Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR

International Journal of Information Security (Journal) , 2008

#31 Limits of Constructive Security Proofs

ASIACRYPT 2008 , 2008

#30 Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles

Journal of Computer Security (JCS) (Journal) , 2008

#29 OAEP is Secure Under Key-dependent Messages

ASIACRYPT 2008 , 2008

#28 Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays

Proceedings of 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC) , 2008

Year: 2007 (Total: 12)

IEEE Symposium on Security and Privacy (Oakland) [S&P]

#27 Information Flow in the Peer-Reviewing Process (extended abstract)

Proceedings of 28th IEEE Symposium on Security and Privacy (SSP) , 2007

IEEE Computer Security Foundations Symposium [CSF]

#26 Causality-based Abstraction of Multiplicity in Security Protocols

Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF) , 2007

#25 Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles

Proceedings of 20th IEEE Computer Security Foundation Symposium (CSF) , 2007

Others

#24 A Calculus of Challenges and Responses

Proceedings of 5th ACM Workshop on Formal Methods in Security Engineering (FMSE) , 2007

#23 Causality-based Abstraction of Multiplicity in Security Protocol Analysis

, 2007

#22 Enterprise Privacy Policies and Languages

Digital Privacy: Theory, Technologies and Practices , 2007

#21 Enterprise Privacy Policies and Languages

Digital Privacy: Theory, Technologies and Practices , 2007

#20 On the Security of Protocols with Logarithmic Communication Complexity

, 2007

#19 On the Necessity of Rewinding in Secure Multiparty Computation

Theory of Cryptography, Proceedings of TCC 2007 , 2007

#18 The Reactive Simulatability Framework for Asynchronous Systems

Information and Computation (Journal) , 2007

#17 Vorgetäuscht / Böse Textdokumente -- Postscript gone wild

iX Magazin für Professionelle Informationstechnik (Journal) , 2007

#16 On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography

Proceedings of 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , 2007

Year: 2006 (Total: 15)

Others

#15 Cryptographically Sound Theorem Proving

Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW) , 2006

#14 Cryptographically Sound Security Proofs for Basic and Public-key Kerberos

Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006

#13 Computationally Sound Secrecy Proofs by Mechanized Flow Analysis

, 2006

#12 Compositional Analysis of Contract Signing Protocols

Theoretical Computer Science (Journal) , 2006

#11 Formal Methods and Cryptography

Proceedings of 14th International Symposium on Formal Methods (FM) , 2006

#10 Games and the Impossibility of Realizable Ideal Functionality

, 2006

#9 Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes

Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006

#8 Proceedings of 9th International Conference on Information Security (ISC), Samos Island, Greece

, 2006

#7 On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol

Proceedings of 21st IFIP International Information Security Conference (SEC) , 2006

#6 Real-or-Random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof

Electronic Notes in Theoretical Computer Science (ENTCS) (Journal) , 2006

#5 Soundness Limits of Dolev-Yao Models

, 2006

#4 Secure Key-Updating for Lazy Revocation

Proceedings of 11th European Symposium on Research in Computer Security(ESORICS) , 2006

#3 Conditional Reactive Simulatability

Proceedings of 11th European Symposium on Research in Computer Security (ESORICS) , 2006

#2 Computationally Sound Secrecy Proofs by Mechanized Flow Analysis

Proceedings of 13th ACM Conference on Computer and Communications Security (CCS) , 2006

#1 Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario

Proceedings of Foundations of Software Science and Computational Structures (FOSSACS) , 2006