Willard Rafnsson

According to our database1, Willard Rafnsson authored at least 15 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Beyond Platforms - Growing Distributed Transaction Networks for Digital Commerce.
CoRR, April, 2025

2022
Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

2021
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis.
CoRR, 2020

Fixing Vulnerabilities Automatically with Linters.
Proceedings of the Network and System Security - 14th International Conference, 2020

2017
Type systems for information flow control: the question of granularity.
ACM SIGLOG News, 2017

Timing-Sensitive Noninterference through Composition.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

2016
Progress-Sensitive Security for SPARK.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2014
Securing Interactive Systems.
PhD thesis, 2014

Compositional Information-Flow Security for Interactive Systems.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Securing Class Initialization in Java-like Languages.
IEEE Trans. Dependable Secur. Comput., 2013

Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
Securing Interactive Programs.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Limiting information leakage in event-based communication.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011


  Loading...