21 papers:
SAS-2015-LeeHYC #static analysis- Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
CSCW-2012-LingelTSN- Practices of information and secrecy in a punk rock subculture (JL, AT, JS, MN), pp. 157–166.
ICALP-v1-2010-ApplebaumIK #performance #verification- From Secrecy to Soundness: Efficient Verification via Secure Computation (BA, YI, EK), pp. 152–163.
LICS-2007-RabinST #correctness #performance #proving- Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications (MOR, RAS, CT), pp. 63–76.
ICALP-v2-2006-AlurCZ #refinement- Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
CHI-2006-GawFF #email- Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
CSL-2006-CortierRZ #standard- Relating Two Standard Notions of Secrecy (VC, MR, EZ), pp. 303–318.
TACAS-2003-BozgaLP #abstraction #protocol #verification- Pattern-Based Abstraction for Verifying Secrecy in Protocols (LB, YL, MP), pp. 299–314.
ICALP-2003-BugliesiCPS #network- Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
PPDP-2003-EchahedPS #concurrent #process- Statically assuring secrecy for dynamic concurrent processes (RE, FP, WS), pp. 91–101.
CAV-2003-BozgaLP #automation #named #protocol #security #verification- HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
SAS-2002-Blanchet #authentication #protocol #security- From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
POPL-2002-AbadiB #logic programming #protocol #security #source code- Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
FoSSaCS-2001-AbadiB #communication #symmetry- Secrecy Types for Asymmetric Communication (MA, BB), pp. 25–41.
FME-2001-Jurjens #refinement- Secrecy-Preserving Refinement (JJ), pp. 135–152.
IJCAR-2001-Paulson #proving #set- SET Cardholder Registration: The Secrecy Proofs (LCP), pp. 5–12.
POPL-2000-VolpanoS #verification- Verifying Secrets and Relative Secrecy (DMV, GS), pp. 268–276.
SAS-1999-Volpano #safety- Safety versus Secrecy (DMV), pp. 303–311.
POPL-1998-HeintzeR #calculus #programming- The SLam Calculus: Programming with Secrecy and Integrity (NH, JGR), pp. 365–377.
STOC-1984-OrlitskyE #communication #constraints- Communication with Secrecy Constraints (AO, AEG), pp. 217–224.
SOSP-1981-Gifford #authentication #encryption #summary- Cryptographic Sealing for Information Secrecy and Authentication (Summary) (DKG), pp. 123–124.