CJF Cremers - Proceedings of the 15th ACM conference on Computer …, 2008 - dl.acm.org
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a number of …
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is …
V Cortier, N Grimm, J Lallemand, M Maffei - Proceedings of the 2017 …, 2017 - dl.acm.org
Mature push button tools have emerged for checking trace properties (eg secrecy or authentication) of security protocols. The case of indistinguishability-based privacy …
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may be …
E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their …
We present a new type system for verifying the security of reference implementations of cryptographic protocols written in a core functional programming language. The type system …
F Eigner, M Maffei - 2013 IEEE 26th Computer Security …, 2013 - ieeexplore.ieee.org
Differential privacy is a confidentiality property for database queries which allows for the release of statistical information about the content of a database without disclosing personal …
M Maffei, K Pecina, M Reinert - 2013 IEEE 26th Computer …, 2013 - ieeexplore.ieee.org
The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving …
AD Gordon, A Jeffrey - International Conference on Concurrency Theory, 2005 - Springer
A realistic threat model for cryptographic protocols or for language-based security should include a dynamically growing population of principals (or security levels), some of which …