Search Results
ICTAC2015 Summer School - Security and Information Flow - Session 2
ICTAC2015 Summer School - Security and Information Flow - Session 1
ICTAC2015 Summer School - Security and Information Flow - Session 4
ICTAC2015 Summer School - Formal Verification Techniques - Session 2
Final steps of the salsa show
PivotWall: SDN-Based Information Flow Control
19 Information Flow Analysis
Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approx.
Modular Verification of Secure Information Flow - Peter Müller
USENIX Security '18 - FlowCog: Context-aware Semantics Extraction and Analysis...
Static Analysis and Machine Learning for Information-flow-security Enforcement - Marco Pistoia
Amal Ahmed Lecture 1, OPLSS 2016