Andrei Sabelfeld
Orcid: 0000-0001-9344-9058Affiliations:
- Chalmers University of Technology, Gothenburg, Sweden
According to our database1,
Andrei Sabelfeld
authored at least 123 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Int. J. Inf. Sec., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Static Analysis - 29th International Symposium, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
IACR Cryptol. ePrint Arch., 2020
VERONICA: Expressive and Precise Concurrent Information Flow Security (Extended Version with Technical Appendices).
CoRR, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
Proc. Priv. Enhancing Technol., 2019
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security, 2019
2018
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2018
Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
J. Comput. Secur., 2016
Proceedings of the Foundations of Security Analysis and Design VIII, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Location-enhanced authentication using the IoT: because you cannot be in two places at once.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields.
Proceedings of the Provable Security, 2015
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, 2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Software Safety and Security - Tools for Analysis and Verification, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011
Proceedings of the Programming Languages and Systems - 9th Asian Symposium, 2011
2010
Proceedings of the Logics and Languages for Reliability and Security, 2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Securing interaction between threads and the scheduler in the presence of synchronization.
J. Log. Algebraic Methods Program., 2009
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
Proceedings of the Computer Security, 2009
From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research.
Proceedings of the Perspectives of Systems Informatics, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Proceedings of the Computer Security, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Localized delimited release: combining the what and where dimensions of information release.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007
Proceedings of the Advances in Computer Science, 2007
2006
Proceedings of the Perspectives of Systems Informatics, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the Advances in Computer Science, 2006
2005
Proceedings of the Foundations of Software Science and Computational Structures, 2005
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study.
Proceedings of the Computer Security, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
J. Comput. Secur., 2003
Proceedings of the Software Security, 2003
Proceedings of the Perspectives of Systems Informatics, 2003
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003
2002
Proceedings of the Static Analysis, 9th International Symposium, 2002
2001
High. Order Symb. Comput., 2001
Proceedings of the Perspectives of System Informatics, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1997
Proceedings of the 1997 ACM SIGPLAN International Conference on Functional Programming (ICFP '97), 1997