21 papers:
- SAS-2015-LeeHYC #static analysis
- Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
- CSCW-2012-LingelTSN
- Practices of information and secrecy in a punk rock subculture (JL, AT, JS, MN), pp. 157–166.
- ICALP-v1-2010-ApplebaumIK #performance #verification
- From Secrecy to Soundness: Efficient Verification via Secure Computation (BA, YI, EK), pp. 152–163.
- LICS-2007-RabinST #correctness #performance #proving
- Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications (MOR, RAS, CT), pp. 63–76.
- ICALP-v2-2006-AlurCZ #refinement
- Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
- CHI-2006-GawFF #email
- Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
- CSL-2006-CortierRZ #standard
- Relating Two Standard Notions of Secrecy (VC, MR, EZ), pp. 303–318.
- TACAS-2003-BozgaLP #abstraction #protocol #verification
- Pattern-Based Abstraction for Verifying Secrecy in Protocols (LB, YL, MP), pp. 299–314.
- ICALP-2003-BugliesiCPS #network
- Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
- PPDP-2003-EchahedPS #concurrent #process
- Statically assuring secrecy for dynamic concurrent processes (RE, FP, WS), pp. 91–101.
- CAV-2003-BozgaLP #automation #named #protocol #security #verification
- HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
- SAS-2002-Blanchet #authentication #protocol #security
- From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
- POPL-2002-AbadiB #logic programming #protocol #security #source code
- Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
- FoSSaCS-2001-AbadiB #communication #symmetry
- Secrecy Types for Asymmetric Communication (MA, BB), pp. 25–41.
- FME-2001-Jurjens #refinement
- Secrecy-Preserving Refinement (JJ), pp. 135–152.
- IJCAR-2001-Paulson #proving #set
- SET Cardholder Registration: The Secrecy Proofs (LCP), pp. 5–12.
- POPL-2000-VolpanoS #verification
- Verifying Secrets and Relative Secrecy (DMV, GS), pp. 268–276.
- SAS-1999-Volpano #safety
- Safety versus Secrecy (DMV), pp. 303–311.
- POPL-1998-HeintzeR #calculus #programming
- The SLam Calculus: Programming with Secrecy and Integrity (NH, JGR), pp. 365–377.
- STOC-1984-OrlitskyE #communication #constraints
- Communication with Secrecy Constraints (AO, AEG), pp. 217–224.
- SOSP-1981-Gifford #authentication #encryption #summary
- Cryptographic Sealing for Information Secrecy and Authentication (Summary) (DKG), pp. 123–124.