The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tamara Rezk: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
    Secure Information Flow by Self-Composition. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:100-114 [Conf]
  2. Gilles Barthe, Tamara Rezk, Ando Saabas
    Proof Obligations Preserving Compilation. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:112-126 [Conf]
  3. Gilles Barthe, Benjamin Grégoire, César Kunz, Tamara Rezk
    Certificate Translation for Optimizing Compilers. [Citation Graph (0, 0)][DBLP]
    SAS, 2006, pp:301-317 [Conf]
  4. Gilles Barthe, Tamara Rezk, David A. Naumann
    Deriving an Information Flow Checker and Certifying Compiler for Java. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:230-242 [Conf]
  5. Gilles Barthe, Tamara Rezk
    Non-interference for a JVM-like language. [Citation Graph (0, 0)][DBLP]
    TLDI, 2005, pp:103-112 [Conf]
  6. Gilles Barthe, Amitabh Basu, Tamara Rezk
    Security Types Preserving Compilation: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    VMCAI, 2004, pp:2-15 [Conf]
  7. Gilles Barthe, Tamara Rezk, Martijn Warnier
    Preventing Timing Leaks Through Transactional Branching Instructions. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:153, n:2, pp:33-55 [Journal]
  8. Gilles Barthe, David Pichardie, Tamara Rezk
    A Certified Lightweight Non-interference Java Bytecode Verifier. [Citation Graph (0, 0)][DBLP]
    ESOP, 2007, pp:125-140 [Conf]
  9. Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
    Security of Multithreaded Programs by Compilation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:2-18 [Conf]

  10. A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. [Citation Graph (, )][DBLP]


  11. Session Types for Access and Information Flow Control. [Citation Graph (, )][DBLP]


  12. Tractable Enforcement of Declassification Policies. [Citation Graph (, )][DBLP]


  13. Robustness Guarantees for Anonymity. [Citation Graph (, )][DBLP]


  14. Cryptographically sound implementations for typed information-flow security. [Citation Graph (, )][DBLP]


  15. Security types preserving compilation. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002