Abstract is missing.
- Preface -- Workshop Trustworthy Software 2006Serge Autexier, Stephan Merz, Leendert W. N. van der Torre, Reinhard Wilhelm, Pierre Wolper. [doi]
- Relating two standard notions of secrecyEugen Zalinescu, Véronique Cortier, Michaël Rusinowitch. [doi]
- An Introduction to the Tool TiccAxel Legay, Luca de Alfaro, Marco Faella. [doi]
- Formal Validation of Pattern Matching codeClaude Kirchner, Pierre-Etienne Moreau, Antoine Reilles. [doi]
- Explaining Data Type Reduction in the Shape Analysis FrameworkBjörn Wachter. [doi]
- Using Abstraction in Modular Verification of Synchronous Adaptive SystemsIna Schaefer, Arnd Poetzsch-Heffter. [doi]
- An Operator-based Approach to Incremental Development of Conform Protocol State MachinesArnaud Lanoix, Dieu Donné Okalas Ossami, Jeanine Souquières. [doi]
- Formalizing On Chip Communications in a Functional StyleJulien Schmaltz, Dominique Borrione. [doi]
- Shape Analysis of SetsJan Reineke. [doi]
- Isolating Intrusions by Automatic ExperimentsStephan Neuhaus. [doi]
- SANA - Security Analysis in Internet Traffic through Artificial Immune SystemsMichael Hilker, Christoph Schommer. [doi]