Conference Paper (814)

1001.
Conference Paper
Backes, M.; Dürmuth, M.; Unruh, D.: OAEP Is Secure under Key-Dependent Messages. In: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, pp. 506 - 523 (Ed. Pieprzyk, J.). Springer, Berlin (2008)
1002.
Conference Paper
Backes, M.; Hamerlik, M.; Linari, A.; Maffei, M.; Tryfonopoulos, C.; Weikum, G.: Anonymous and censorship resistant content sharing in unstructured overlays. In: PODC’08: Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing, p. 429 - 429 (Ed. Patt-Shamir, B.). ACM, New York, NY (2008)
1003.
Conference Paper
Backes, M.; Hritcu, C.; Maffei, M.: Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus. In: 21st IEEE Computer Security Foundations Symposium: CSF 2008 ; proceedings, pp. 195 - 209 (Ed. Kawada, S.). IEEE Computer Society, Los Alamitos, Ca. (2008)
1004.
Conference Paper
Backes, M.; Hritcu, C.; Maffei, M.: Type-checking zero-knowledge. In: CCS’08: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 357 - 370 (Eds. Ning, P.; Syverson, P.; Jha, S.). ACM, New York, NY (2008)
1005.
Conference Paper
Backes, M.; Köpf, B.: Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. In: Computer Security – ESORICS 2008: 13th European Symposium on Research in Computer Security, pp. 517 - 532 (Eds. Jajodia, S.; López, J.). Springer, Berlin (2008)
1006.
Conference Paper
Backes, M.; Lorenz, S.; Maffei, M.; Pecina, K.: The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. In: Computer Aided Verification: 20th International Conference, CAV 2008, pp. 419 - 422 (Eds. Gupta, A.; Malik, S.). Springer, Berlin (2008)
1007.
Conference Paper
Backes, M.; Maffei, M.; Unruh, D.: Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 202 - 215 (Ed. Werner, B.). IEEE, Piscataway, NJ (2008)
1008.
Conference Paper
Backes, M.; Unruh, D.: Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. In: 21st IEEE Computer Security Foundations Symposium: CSF 2008 ; proceedings, pp. 255 - 269 (Ed. Kawada, S.). IEEE Computer Society, Los Alamitos, Ca. (2008)
1009.
Conference Paper
Backes, M.; Unruh, D.: Limits of Constructive Security Proofs. In: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, pp. 290 - 307 (Ed. Pieprzyk, J.). Springer, Berlin (2008)
1010.
Conference Paper
Cha, M.; Mislove, A.; Adams, B.; Gummadi, K. P.: Characterizing Social Cascades in Flickr. In: Compilation E-Proceedings of the SIGCOMM 2008 Conference & the co-located workshops: WOSN'08 Proceedings, pp. 13 - 18. ACM, New York, NY (2008)
1011.
Conference Paper
Cha, M.; Rodriguez, P.; Crowcroft, J.; Moon, S.; Amatrianin, X.: Watching Television Over an IP Network. In: IMC’08: proceedings of the 2008 ACM SIGCOMM Internet Measurement Conference, pp. 71 - 84. ACM, New York, NY (2008)
1012.
Conference Paper
Cha, M.; Rodriguez, P.; Moon, S.; Crowcroft, J.: On Next-Generation Telco-Managed P2P TV Architectures. In: 7th International Workshop on Peer-to-Peer Systems (IPTPS2008), pp. 475 - 505. ACM, New York, NY, USA (2008)
1013.
Conference Paper
Cook, B.; Gulwani, S.; Lev-Ami, T.; Rybalchenko, A.; Sagiv, M.: Proving Conditional Termination. In: Computer Aided Verification: 20th International Conference, CAV 2008, pp. 328 - 340 (Eds. Gupta, A.; Malik, S.). Springer, New York, USA (2008)
1014.
Conference Paper
Dischinger, M.; Haeberlen, A.; Beschastnikh, I.; Gummadi, K. P.; Saroiu, S.: SatelliteLab: Adding Heterogeneity to Planetary-Scale Testbeds. In: SIGCOMM 2008, pp. 315 - 326. ACM, New York, NY (2008)
1015.
Conference Paper
Dischinger, M.; Mislove, A.; Haeberlen, A.; Gummadi, K. P.: Detecting BitTorrent Blocking. In: IMC’08: proceedings of the 2008 ACM SIGCOMM Internet Measurement Conference, pp. 3 - 8. ACM, New York, NY (2008)
1016.
Conference Paper
Dreyer, D.; Rossberg, A.: Mixin' Up the ML Module System. In: ICFP’08: proceedings of the 2008 SIGPLAN International Conference on Functional Programming, pp. 307 - 320. ACM, New York, NY (2008)
1017.
Conference Paper
Ford, B.; Iyengar, J.: Breaking Up the Transport Logjam. In: Seventh ACM Workshop on Hot Topics in Networks (HotNets-VII), pp. 15.1 - 6. ACM, New York, NY (2008)
1018.
Conference Paper
Gupta, A.; Henzinger, T. A.; Majumdar, R.; Rybalchenko, A.; Xu, R.-G.: Proving non-termination. In: POPL’08: proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 147 - 158 (Eds. Necula, G. C.; Wadler, P.). ACM, New York, NY (2008)
1019.
Conference Paper
Haeberlen, A.; Rodrigues, R.; Gummadi, K. P.; Druschel, P.: Pretty Good Packet Authentication. In: HotDep '08: 4th Workshop on Hot Topics in System Dependability, pp. 1 - 5. USENIX, Berkeley, CA (2008)
1020.
Conference Paper
Podelski, A.; Rybalchenko, A.; Wies, T.: Heap Assumptions on Demand. In: Computer Aided Verification: 20th International Conference, CAV 2008, pp. 314 - 327 (Eds. Gupta, A.; Malik, S.). Springer, New York, USA (2008)
Go to Editor View