{ZQL}: A Compiler for {Privacy-Preserving} Data Processing C Fournet, M Kohlweiss, G Danezis, Z Luo 22nd USENIX Security Symposium (USENIX Security 13), 163-178, 2013 | 52 | 2013 |
On automatic verification of self-stabilizing population protocols J Pang, Z Luo, Y Deng Frontiers of Computer Science in China 2, 357-367, 2008 | 29 | 2008 |
Reasoning for Web Applications: An Operational Semantics for Hop G Boudol, Z Luo, T Rezk, M Serrano | 24 | 2011 |
Automated Code Injection Prevention for Web Applications Z Luo, T Rezk, M Serrano Theory of Security and Applications, 2011 | 19 | 2011 |
Analyzing an electronic cash protocol using applied pi calculus Z Luo, X Cai, J Pang, Y Deng International Conference on Applied Cryptography and Network Security, 87-103, 2007 | 18 | 2007 |
Mashic compiler: Mashup sandboxing based on inter-frame communication Z Luo, T Rezk 2012 IEEE 25th Computer Security Foundations Symposium, 157-170, 2012 | 14 | 2012 |
Towards reasoning for web applications: an operational semantics for hop G Boudol, Z Luo, T Rezk, M Serrano Proceedings of the 2010 Workshop on Analysis and Programming Languages for …, 2010 | 9 | 2010 |
Robustness guarantees for anonymity G Barthe, A Hevia, Z Luo, T Rezk, B Warinschi 2010 23rd IEEE Computer Security Foundations Symposium, 91-106, 2010 | 5 | 2010 |
Mashic compiler: Mashup sandboxing based on inter-frame communication Z Luo, J Fragoso Santos, A Almeida Matos, T Rezk Journal of Computer Security 24 (1), 91-136, 2016 | 1 | 2016 |
Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups Z Luo International Conference on Provable Security, 185-199, 2008 | | 2008 |