Publications
Search results for wp3 [Reset Search]
“Formal Modeling and Analysis of Timed Systems - 11th International Conference, FORMATS 2013, Buenos Aires, Argentina, August 29-31, 2013. Proceedings”, FORMATS, vol. 8053. 2013.
Geo-Indistinguishability: Differential Privacy for Location-Based Systems”, in 20th ACM Conference on Computer and Communications Security, Berlin, Germany, 2013.
, “ Maximizing Entropy over Markov Processes”, in Language and Automata Theory and Applications - 7th International Conference, {LATA} 2013, Bilbao, Spain, April 2-5, 2013. Proceedings, 2013.main.pdf (268.88 KB)
, “ Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus”, in 7th International Symposium on Trustworthy Global Computing (TGC), Newcastle upon Tyne, United Kingdom, 2013.
, “ Preserving differential privacy under finite-precision semantics”, in Proceedings of the Eleventh Workshop on Quantitative Aspects of Programming Languages (QAPL), 2013.diff_priv.pdf (213.64 KB)
, “ {QUAIL:} {A} Quantitative Security Analyzer for Imperative Code”, in Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings, 2013.main.pdf (187.56 KB)
, “ Quantifying Information Leakage of Randomized Protocols”, in Verification, Model Checking, and Abstract Interpretation, 14th International Conference, {VMCAI} 2013, Rome, Italy, January 20-22, 2013. Proceedings, 2013.vmcai2013.pdf (865.61 KB)
, “ Quantitative Approaches to Information Protection”, in Logic, Language, Information, and Computation - 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013. Proceedings, 2013.
, ““Quantitative Evaluation of Systems - 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings”, Lecture Notes in Computer Science, vol. 8054. 2013.
Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability”, in Trustworthy Global Computing, vol. 8191, 2013, p. 182-197.
, “ TRIPLEX: Verifying Data Minimisation in Communication Systems”, in CCS, 2013.
, “ Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems”, in Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012.
, “ Epistemic Strategies and Games on Concurrent Processes”, ACM Trans. Comput. Log., vol. 13, p. 28, 2012.
, “ Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy”, in Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, 2012.
, “ Measuring Information Leakage using Generalized Gain Functions”, in Proceedings of the Computer Security Foundations Symposium (CSF), 2012, p. 265-279.gleakage.pdf (330.44 KB)
, “ Quantitative information flow in interactive systems”, Journal of Computer Security, vol. 20, p. 3-50, 2012.full.pdf (532.59 KB)
, ““Quantitative Security Analysis (Dagstuhl Seminar 12481)”, Dagstuhl Reports, vol. 2. p. 135-154, 2012.
Spatial and Epistemic Modalities in Constraint-Based Process Calculi”, in Proceedings of CONCUR, Newcastle upon Tyne, UK, 2012.hal.archives-ouvertes.fr:docs:00:76:11:16:PDF:eccp.pdf (2.71 MB)
, “ Special issue dedicated to a selection of papers of the conference Mathematical Foundations of Programming Semantics (MFPS XXV)”, Theor. Comput. Sci., vol. 430, p. 1-2, 2012.
, “ Taint Analysis of Security Code in the KLEE Symbolic Execution Engine”, in 2012 International Conference on Information and Communications Security (ICICS), Hong Kong, 2012.76180264 (1).pdf (252.37 KB)
, “ Verified Cryptographic Implementations for TLS”, ACM Trans. Inf. Syst. Secur., vol. 15, p. 3, 2012.
, “