Number of items: 7.
B
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015)
Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2).
178 - 191.
ISSN 1545-5971
Bichhawat, Abhishek and Hammer, Christian and Garg, Deepak and Rajani, Vineet
(2015)
Information Flow Control for Event Handling and the DOM in Web Browsers.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2015)
Affine Refinement Types for Secure Distributed Programming.
ACM Transactions on Programming Languages and Systems, 37 (4).
11:1-11:66.
C
Cortier, VĂ©ronique and Eigner, Fabienne and Kremer, Steve and Maffei, Matteo and Wiedling, Cyrille
(2015)
Type-Based Verification of Electronic Voting Protocols.
D
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
A Logic of Programs with Interface-Confined Code.
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015)
Program Actions as Actual Causes: A Building Block for Accountability.
E
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015)
Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In:
UNSPECIFIED
Cryptology and Information Security Series, 13
.
IOS Press, 81 - 105.
This list was generated on Mon Dec 2 19:28:25 2024 CET.