Number of items: 63.
Grimm, Niklas and Maillard, Kenji and Fournet, Cédric and Hritcu, Catalin and Maffei, Matteo and Protzenko, Jonathan and Ramananandro, Tahina and Rastogi, Aseem and Swamy, Nikhil and Béguelin, Santiago Zanella
(2018)
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo
(2017)
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
Malavolta, Giulio and Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Ravi, Srivatsan
(2017)
Concurrency and Privacy with Payment-Channel Networks.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2017)
Maliciously Secure Multi-Client ORAM.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2017)
Maliciously Secure Multi-Client ORAM.
IACR Cryptology ePrint Archive, 2017.
p. 329.
Grimm, Niklas and Maillard, Kenji and Fournet, Cédric and Hritcu, Catalin and Maffei, Matteo and Protzenko, Jonathan and Rastogi, Aseem and Swamy, Nikhil and Béguelin, Santiago Zanella
(2017)
A Monadic Framework for Relational Verification (Functional Pearl).
CoRR, abs/17.
Maffei, Matteo
(2017)
Security & privacy column.
SIGLOG News, 4 (1).
p. 5.
Maffei, Matteo
(2017)
Security & privacy column.
SIGLOG News, 4 (4).
p. 18.
Calzavara, Stefano and Grishchenko, Ilya and Koutsos, Adrien and Maffei, Matteo
(2017)
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications.
Calzavara, Stefano and Grishchenko, Ilya and Koutsos, Adrien and Maffei, Matteo
(2017)
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications.
CoRR, abs/17.
Cortier, Véronique and Grimm, Niklas and Lallemand, Joseph and Maffei, Matteo
(2017)
A Type System for Privacy Properties (Technical Report).
CoRR, abs/17.
Cortier, Véronique and Grimm, Niklas and Lallemand, Joseph and Maffei, Matteo
(2017)
A Type System for Privacy Properties.
Maffei, Matteo and Grimm, Niklas and Focardi, Riccardo and Calzavara, Stefano
(2016)
Micro-Policies for Web Session Security.
Grishchenko, Ilya and Maffei, Matteo and Calzavara, Stefano
(2016)
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving.
Maffei, Matteo
(2016)
Security & Privacy Column.
SIGLOG News.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2015)
Affine Refinement Types for Secure Distributed Programming.
ACM Transactions on Programming Languages and Systems, 37 (4).
11:1-11:66.
Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015)
Symbolic Malleable Zero-knowledge Proofs.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015)
Privacy and Access Control for Outsourced Personal Records.
Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015)
Privacy Preserving Payments in Credit Networks.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015)
Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In:
UNSPECIFIED
Cryptology and Information Security Series, 13
.
IOS Press, 81 - 105.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Cortier, Véronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2014)
Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-party Setting.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Differentially Private Data Aggregation with Optimal Utility.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014)
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2).
pp. 301-353.
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014)
Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptology ePrint Archive, 2014.
p. 482.
Maffei, Matteo
(2014)
Security & privacy column.
SIGLOG News, 1 (1).
p. 6.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
Eigner, Fabienne and Maffei, Matteo
(2013)
Differential Privacy by Typing in Security Protocols.
Maffei, Matteo and Pecina, Kim and Reinert, Manuel
(2013)
Security and Privacy by Declarative Design.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Enforcing User Requirements on Android Apps.
In:
Tools and Algorithms for the Construction and Analysis of Systems.
Springer, pp. 545-550.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013)
AppGuard - Fine-grained Policy Enforcement for Untrusted Android Applications.
Technical Report.
UNSPECIFIED.
(Unpublished)
Eigner, Fabienne and Maffei, Matteo
(2013)
Differential Privacy by Typing in Security Protocols.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2013)
Logical Foundations of Secure Resource Management.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2013)
Union, Intersection, and Refinement Types and Reasoning About Type Disjointness for Secure Protocol Implementations.
Special issue of the Journal of Computer Security (JCS) for TOSCA-SecCo.
Backes, Michael and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2012)
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2012)
Automated Synthesis of Secure Distributed Applications.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2012)
Affine Refinement Types for Authentication and Authorization.
Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2012)
AppGuard - Real-time Policy Enforcement for Third-Party Applications.
Technical Report.
UNSPECIFIED.
(Unpublished)
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
A Security API for Distributed Social Networks.
Backes, Michael and Maffei, Matteo and Pecina, Kim and Reischuk, Raphael M.
(2011)
G2C: Cryptographic Protocols from Goal-Driven Specifications.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2011)
Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols.
Backes, Michael and Maffei, Matteo and Pecina, Kim
(2011)
Securing social networks.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2011)
Union and Intersection Types for Secure Protocol Implementations.
Maffei, Matteo and Pecina, Kim
(2011)
Privacy-aware proof-carrying authorization.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymity and Trust in Distributed Systems.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymous Webs of Trust.
Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010)
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010)
Computationally Sound Verification of Source Code.
Backes, Michael and Grochulla, Martin and Hriţcu, Cătălin and Maffei, Matteo
(2009)
Achieving Security Despite Compromise Using Zero-knowledge.
Backes, Michael and Hamerlik, Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymity and Censorship Resistance in Unstructured Overlay Networks.
Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2009)
Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
Backes, Michael and Maffei, Matteo
(2009)
Design and Verification of Anonymous Trust Protocols.
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2008)
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
Backes, Michael and Hamerlik, Lech Marek and Linari, Alessandro and Maffei, Matteo and Tryfonopoulos, Christos and Weikum, Gerhard
(2008)
Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2008)
CASPA: Causality-based Abstraction for Security Protocol Analysis.
Backes, Michael and Maffei, Matteo and Hriţcu, Cătălin
(2008)
Type-checking zero-knowledge.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2008)
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Backes, Michael and Cortesi, Agostino and Focardi, Riccardo and Maffei, Matteo
(2007)
A Calculus of Challenges and Responses.
Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007)
Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
Backes, Michael and Cortesi, Agostino and Maffei, Matteo
(2007)
Causality-based Abstraction of Multiplicity in Security Protocols.
This list was generated on Sun Dec 22 09:30:34 2024 CET.