2018-annual-report
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
78
annual report
20
23. Ahmed Bouajjani, Michael Emmi, Constantin
Enea, Jad Hamza. On reducing linearizability
to state reachability. Inf. Comput.,
Vol. 261, Num. Part 2, pages 383–400,
2018.
1.1.2. Conferences
24. Juanru Li, Zhiqiang Lin, Juan Caballero,
Yuanyuan Zhang, Dawu Gu. Pinpointing
Insecure Cryptographic Keys from Execution
Traces. Proceedings of the 25th ACM
Conference on Computer and Communication
Security, October 2018.
25. Platon Kotzias, Abbas Razaghpanah, Johanna
Amann, Kenneth G. Paterson, Narseo
Vallina-Rodríguez, Juan Caballero. Coming
of Age: A Longitudinal Study of TLS
Deployment. ACM Internet Measurement
Conference (IMC), pages 415–428, ACM,
October 2018.
26. Maximiliano Klemen, Nataliia Stulova,
Pedro López-García, José F. Morales,
Manuel V. Hermenegildo. Static Performance
Guarantees for Programs with Runtime
Checks. 20th Int’l. ACM SIGPLAN
Symposium on Principles and Practice of
Declarative Programming (PPDP’18), 12
pages, ACM Press, September 2018.
27. Dario Fiore, Elena Pagnin. Matrioska: A
Compiler for Multi-Key Homomorphic Signatures.
Security and Cryptography for Networks
- 11th International Conference, SCN
2018, LNCS, Vol. 11035, pages 43–62,
Springer, September 2018.
28. Michel Abdalla, Dario Catalano, Dario Fiore,
Romain Gay, Bogdan Ursu. Multi-Input
Functional Encryption for Inner Products:
Function-Hiding Realizations and Constructions
without Pairings. Advances in Cryptology:
Proc. of the 38th Annual Cryptology
Conference (CRYPTO 2018), LNCS, Vol.
10991, pages 597–627, Springer, August
2018.
29. Zhenhao He, David Sidler, Zsolt István, Gustavo
Alonso. A Flexible K-Means Operator for
Hybrid Databases. Proceedings of the International
Conference on Field-Programmable
Logic and Applications, FPL’18, pages 368–
371, August 2018.
30. Zsolt István, Gustavo Alonso, Ankit Singla.
Providing Multi-tenant Services with FPGAs:
Case Study on a Key-Value Store. Proceedings
of the International Conference on
Field-Programmable Logic and Applications,
FPL’18, pages 119–124, August 2018.
31. Arianna Blasi, Alberto Goffi, Konstantin
Kuznetsov, Alessandra Gorla, Michael D.
Ernst, Mauro Pezzè, Sergio Delgado Castellanos.
Translating Code Comments to Procedure
Specifications. Proceedings of the
27th International Symposium on Software
Testing and Analysis, pages 242–253, July
2018.
32. Dario Catalano, Dario Fiore, Luca Nizzardo.
On the Security Notions for Homomorphic
Signatures. Applied Cryptography and
Network Security, ACNS 2018, LNCS, Vol.
10892, pages 183–201, Springer, June
2018.
33. Vishal Karande, Swarup Chandra, Zhiqiang
Lin, Juan Caballero, Latifur Khan,
Kevin Hamlen. BCD: Decomposing Binary
Code Into Components Using Graph-Based
Clustering. 13th ACM ASIA Conference
on Information, Computer and Communications
Security, June 2018.