Abstract is missing.
- Guiding a General-Purpose C Verifier to Prove Cryptographic ProtocolsFrançois Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann. 3-17 [doi]
- Integrated Specification and Verification of Security Protocols and PoliciesSimone Frau, Mohammad Torabi Dashti. 18-32 [doi]
- StatVerif: Verification of Stateful ProcessesMyrto Arapinis, Eike Ritter, Mark Dermot Ryan. 33-47 [doi]
- Automated Proofs for Diffie-Hellman-Based Key ExchangesLong Ngo, Colin Boyd, Juan Gonz lez Nieto. 51-65 [doi]
- Formal Analysis of Protocols Based on TPM State RegistersStéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel. 66-80 [doi]
- Resource-Aware Authorization Policies for Statically Typed Cryptographic ProtocolsMichele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei. 83-98 [doi]
- Obstruction-Free Authorization Enforcement: Aligning Security with Business ObjectivesDavid A. Basin, Samuel J. Burri, Günter Karjoth. 99-113 [doi]
- Dynamic Enforcement of Knowledge-Based Security PoliciesPiotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa. 114-128 [doi]
- Modular Protections against Non-control Data AttacksCole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker, Benjamin G. Zorn. 131-145 [doi]
- Static Analysis for Efficient Hybrid Information-Flow ControlScott Moore, Stephen Chong. 146-160 [doi]
- Local Memory via Layout RandomizationRadha Jagadeesan, Corin Pitcher, Julian Rathke, James Riely. 161-174 [doi]
- A Statistical Test for Information Leaks Using Continuous Mutual InformationTom Chothia, Apratim Guha. 177-190 [doi]
- Information-Theoretic Bounds for Differentially Private MechanismsGilles Barthe, Boris Köpf. 191-204 [doi]
- The Complexity of Quantitative Information Flow ProblemsPavol Cerný, Krishnendu Chatterjee, Thomas A. Henzinger. 205-217 [doi]
- Assumptions and Guarantees for Compositional NoninterferenceHeiko Mantel, David Sands, Henning Sudbrock. 218-232 [doi]
- Vertical Protocol CompositionThomas Groß, Sebastian Mödersheim. 235-250 [doi]
- Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness)Dominique Unruh. 251-265 [doi]
- Security for Key Management InterfacesSteve Kremer, Graham Steel, Bogdan Warinschi. 266-280 [doi]
- Attacking and Fixing Helios: An Analysis of Ballot SecrecyVéronique Cortier, Ben Smyth. 297-311 [doi]
- Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy ProtectionJeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha. 312-327 [doi]