Abstract is missing.
- Approximation and Randomization for Quantitative Information-Flow AnalysisBoris Köpf, Andrey Rybalchenko. 3-14 [doi]
- Quantitative Information Flow - Verification Hardness and PossibilitiesHirotoshi Yasuoka, Tachio Terauchi. 15-27 [doi]
- Quantification of IntegrityMichael R. Clarkson, Fred B. Schneider. 28-43 [doi]
- Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing AttacksBoris Köpf, Geoffrey Smith. 44-56 [doi]
- Modeling and Verifying Ad Hoc Routing ProtocolsMathilde Arnaud, Véronique Cortier, Stéphanie Delaune. 59-74 [doi]
- Formal Verification of Privacy for RFID SystemsMayla Brusò, Konstantinos Chatzikokolakis, Jerry den Hartog. 75-88 [doi]
- Robustness Guarantees for AnonymityGilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, Bogdan Warinschi. 91-106 [doi]
- Analysing Unlinkability and Anonymity Using the Applied Pi CalculusMyrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan. 107-121 [doi]
- A Game-Based Definition of Coercion-Resistance and Its ApplicationsRalf Küsters, Tomasz Truderung, Andreas Vogt. 122-136 [doi]
- Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and TechniquesAdam J. Lee, Ting Yu. 139-153 [doi]
- Constraining Credential Usage in Logic-Based Access ControlLujo Bauer, Limin Jia, Divya Sharma. 154-168 [doi]
- Information Flow in Credential SystemsMoritz Y. Becker. 171-185 [doi]
- Dynamic vs. Static Flow-Sensitive Security AnalysisAlejandro Russo, Andrei Sabelfeld. 186-199 [doi]
- Information Flow Monitor InliningAndrey Chudnov, David A. Naumann. 200-214 [doi]
- Required Information ReleaseStephen Chong. 215-227 [doi]
- Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security ProofsSimon Meier, Cas J. F. Cremers, David A. Basin. 231-245 [doi]
- A Machine-Checked Formalization of Sigma-ProtocolsGilles Barthe, Daniel Hedin, Santiago Zanella Béguelin, Benjamin Grégoire, Sylvain Heraud. 246-260 [doi]
- Impossibility Results for Secret EstablishmentBenedikt Schmidt, Patrick Schaller, David A. Basin. 261-273 [doi]
- A Framework for the Sound Specification of Cryptographic TasksJuan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou. 277-289 [doi]
- Towards a Formal Foundation of Web SecurityDevdatta Akhawe, Adam Barth, Peifung E. Lam, John C. Mitchell, Dawn Song. 290-304 [doi]
- Automating Open Bisimulation Checking for the Spi CalculusAlwen Tiu, Jeremy E. Dawson. 307-321 [doi]
- Protocol Composition for Arbitrary PrimitivesStefan Ciobåca, Véronique Cortier. 322-336 [doi]
- On Protection by Layout RandomizationMartín Abadi, Gordon D. Plotkin. 337-351 [doi]