Abstract is missing.
- Calculating bounds on information leakage using two-bit patternsZiyuan Meng, Geoffrey Smith. 1 [doi]
- Differential privacy with information flow controlArnar Birgisson, Frank McSherry, MartÃn Abadi. 2 [doi]
- The potential of sampling for dynamic analysisJoseph L. Greathouse, Todd M. Austin. 3 [doi]
- Limiting information leakage in event-based communicationWillard Rafnsson, Andrei Sabelfeld. 4 [doi]
- Capabilities for information flowArnar Birgisson, Alejandro Russo, Andrei Sabelfeld. 5 [doi]
- Epistemic temporal logic for information flow securityMusard Balliu, Mads Dam, Gurvan Le Guernic. 6 [doi]
- Privacy-aware proof-carrying authorizationMatteo Maffei, Kim Pecina. 7 [doi]
- SAFERPHP: finding semantic vulnerabilities in PHP applicationsSooel Son, Vitaly Shmatikov. 8 [doi]