By year

2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 |


  1. C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolic, I. Zachevsky
    "Robust Data Sharing with Key-Value Stores"
    Proc. 42nd Annual IEEE/IFIP Int'l Conf. on Dependable Systems and Networks "DSN 2012," Boston , MA (IEEE, June 2012).
  2. D. Basin, S.J. Burri, G. Karjoth
    "Optimal Workflow-Aware Authorizations"
    Proc. 17th ACM Symp. on Access Control Models and Technologies "SACMAT," Newark, NJ (ACM, June 2012) 93-102.
  3. P. Bichsel
    "Cryptographic Protocols and System Aspects for Practical Data-Minimizing Authentication"
    PhD Thesis, K.U. Leuven - Faculty of Engineering, (March 2012), pp. 234.
  4. P. Bichsel, J. Camenisch, D. Sommer
    "A Calculus for Privacy-Friendly Authentication"
    Proc. 17th ACM Symp. on Access Control Models and Technologies "SACMAT," Newark, NJ (ACM, June 2012) 157-166.
  5. S. Bleikertz, A. Kurmus, Z.A. Nagy, M. Schunter
    "Secure Cloud Maintenance - Protecting Workloads Against Insider Attacks"
    Proc. 7th ACM Symp. on Information, Computer and Communications Security "ASIACCS," Seoul, S. Korea (ACM, May 2012).
  6. S. Burri, G. Karjoth
    "Flexible Scoping of Authorization Contraints on Business Processes with Loops and Parallelism"
    Proc. Business Process Management Workshops 2011, Lecture Notes in Business Information Processing, vol. 100, Part 6, (Springer 2012) 411-422.
  7. C. Cachin, B. Junker, A. Sorniotti
    "On Limitations of Using Cloud Storage for Data Replication"
    Proc. 6th Workshop on Recent Advances on Intrusion Tolerance and reSilience "WRAITS 2012," Boston, MA (IEEE, June 2012).
  8. J. Camenisch, A. Lehmann, G. Neven
    "Electronic Identities Need Private Credentials"
    IEEE Security and Privacy (10)1 (January - February 2012) 80-83 (invited).
  9. J.P. Degabriele, A. Lehmann, K. Paterson, N. Smart, M. Strefler
    "On the Joint Security of Encryption and Signature in EMV"
    in "Topics in Cryptology - CT-RSA 2012", Proc. The Cryptographers Track at the RSA Conference 2012 "CT-RSA," San Francisco, CA, Lecture Notes in Computer Science, vol. 7178, (Springer, 2012), pp. 116-135.
  10. R. Kapitza, J. Behl, C. Cachin, T. Distler, S. Kuhnle, S.V. Mohammadi, W. Schroeder-Preikschat, K. Stengel
    "CheapBFT: Resource-Efficient Byzantine Fault Tolerance"
    Proc. 7th ACM European Conf. on Computer Systems "EuroSys 2012," Bern, Switzerland (ACM, April 2012) 295-308.


The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.