BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
secur (4)
protocol (4)
preserv (3)
refin (2)
effici (2)

Stem secreci$ (all stems)

21 papers:

SASSAS-2015-LeeHYC #static analysis
Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
CSCWCSCW-2012-LingelTSN
Practices of information and secrecy in a punk rock subculture (JL, AT, JS, MN), pp. 157–166.
ICALPICALP-v1-2010-ApplebaumIK #performance #verification
From Secrecy to Soundness: Efficient Verification via Secure Computation (BA, YI, EK), pp. 152–163.
LICSLICS-2007-RabinST #correctness #performance #proving
Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications (MOR, RAS, CT), pp. 63–76.
ICALPICALP-v2-2006-AlurCZ #refinement
Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
CHICHI-2006-GawFF #email
Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
CSLCSL-2006-CortierRZ #standard
Relating Two Standard Notions of Secrecy (VC, MR, EZ), pp. 303–318.
TACASTACAS-2003-BozgaLP #abstraction #protocol #verification
Pattern-Based Abstraction for Verifying Secrecy in Protocols (LB, YL, MP), pp. 299–314.
ICALPICALP-2003-BugliesiCPS #network
Secrecy in Untrusted Networks (MB, SC, AP, VS), pp. 969–983.
PPDPPPDP-2003-EchahedPS #concurrent #process
Statically assuring secrecy for dynamic concurrent processes (RE, FP, WS), pp. 91–101.
CAVCAV-2003-BozgaLP #automation #named #protocol #security #verification
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
SASSAS-2002-Blanchet #authentication #protocol #security
From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
POPLPOPL-2002-AbadiB #logic programming #protocol #security #source code
Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
FoSSaCSFoSSaCS-2001-AbadiB #communication #symmetry
Secrecy Types for Asymmetric Communication (MA, BB), pp. 25–41.
FMFME-2001-Jurjens #refinement
Secrecy-Preserving Refinement (JJ), pp. 135–152.
IJCARIJCAR-2001-Paulson #proving #set
SET Cardholder Registration: The Secrecy Proofs (LCP), pp. 5–12.
POPLPOPL-2000-VolpanoS #verification
Verifying Secrets and Relative Secrecy (DMV, GS), pp. 268–276.
SASSAS-1999-Volpano #safety
Safety versus Secrecy (DMV), pp. 303–311.
POPLPOPL-1998-HeintzeR #calculus #programming
The SLam Calculus: Programming with Secrecy and Integrity (NH, JGR), pp. 365–377.
STOCSTOC-1984-OrlitskyE #communication #constraints
Communication with Secrecy Constraints (AO, AEG), pp. 217–224.
SOSPSOSP-1981-Gifford #authentication #encryption #summary
Cryptographic Sealing for Information Secrecy and Authentication (Summary) (DKG), pp. 123–124.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.