wikidata.org
IEEE Computer Security Foundations Symposium
container_kea5jpvemrdmvbwvgh5jn6gog4
Homepage URLs
http://www.csl.sri.com/programs/security/csfw/ |
Example Publications
On Post-compromise Security
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
2016
|
IEEE Computer Security Foundations Symposium
doi:10.1109/csf.2016.19 dblp:conf/csfw/Cohn-GordonCG16
Composition Theorems for CryptoVerif and Application to TLS 1.3
Bruno Blanchet
2018
|
IEEE Computer Security Foundations Symposium
doi:10.1109/csf.2018.00009 dblp:conf/csfw/Blanchet18
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse
2018
|
IEEE Computer Security Foundations Symposium
doi:10.1109/csf.2018.00033 dblp:conf/csfw/DreierHRS18
Actor Key Compromise: Consequences and Countermeasures
David Basin, Cas Cremers, Marko Horvat
2014
|
IEEE Computer Security Foundations Symposium
doi:10.1109/csf.2014.25 dblp:conf/csfw/BasinCH14
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
Richard Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov
2009
|
IEEE Computer Security Foundations Symposium
doi:10.1109/csf.2009.13 dblp:conf/csfw/ChangJISS09