Author:
Askarov Aslan,Sabelfeld Andrei
Cited by
87 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Verification of Low-Trust Architectures;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. Tainted Secure Multi-Execution to Restrict Attacker Influence;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. Compositional Security Definitions for Higher-Order Where Declassification;Proceedings of the ACM on Programming Languages;2023-04-06
4. Reconciling Shannon and Scott with a Lattice of Computable Information;Proceedings of the ACM on Programming Languages;2023-01-09
5. Information Flow Control in Software DB Units Based on Formal Verification;Programming and Computer Software;2022-07-18