Structuring Protocol Implementations to Protect Sensitive Data

Petr Marchenko, Brad Karp. Structuring Protocol Implementations to Protect Sensitive Data. In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings. pages 47-62, USENIX Association, 2010. [doi]

@inproceedings{MarchenkoK10,
  title = {Structuring Protocol Implementations to Protect Sensitive Data},
  author = {Petr Marchenko and Brad Karp},
  year = {2010},
  url = {http://www.usenix.org/events/sec10/tech/full_papers/Marchenko.pdf},
  tags = {protocol, data-flow},
  researchr = {https://researchr.org/publication/MarchenkoK10},
  cites = {0},
  citedby = {0},
  pages = {47-62},
  booktitle = {19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings},
  publisher = {USENIX Association},
}