Abstract is missing.
- Differential Privacy and the Power of (Formalizing) Negative Thinking - (Extended Abstract)Cynthia Dwork. 1-2 [doi]
- Security Protocol Verification: Symbolic and Computational ModelsBruno Blanchet. 3-29 [doi]
- Analysing Routing Protocols: Four Nodes Topologies Are SufficientVéronique Cortier, Jan Degrieck, Stéphanie Delaune. 30-50 [doi]
- Parametric Verification of Address Space SeparationJason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan. 51-68 [doi]
- Verification of Security Protocols with Lists: From Length One to Unbounded LengthMiriam Paiola, Bruno Blanchet. 69-88 [doi]
- Privacy Supporting Cloud Computing: ConfiChair, a Case StudyMyrto Arapinis, Sergiu Bursuc, Mark Ryan. 89-108 [doi]
- A Formal Analysis of the Norwegian E-voting ProtocolVéronique Cortier, Cyrille Wiedling. 109-128 [doi]
- Provably Repairing the ISO/IEC 9798 Standard for Entity AuthenticationDavid A. Basin, Cas J. F. Cremers, Simon Meier. 129-148 [doi]
- Security Proof with Dishonest KeysHubert Comon-Lundh, Véronique Cortier, Guillaume Scerri. 149-168 [doi]
- Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and CommutativityMyrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan. 169-188 [doi]
- Towards Unconditional Soundness: Computationally Complete Symbolic AttackerGergei Bana, Hubert Comon-Lundh. 189-208 [doi]
- Verified Indifferentiable Hashing into Elliptic CurvesGilles Barthe, Benjamin Grégoire, Sylvain Heraud, Federico Olmedo, Santiago Zanella Béguelin. 209-228 [doi]
- Provable De-anonymization of Large Datasets with Sparse DimensionsAnupam Datta, Divya Sharma, Arunesh Sinha. 229-248 [doi]
- Revisiting Botnet Models and Their Implications for Takedown StrategiesTing-Fang Yen, Michael K. Reiter. 249-268 [doi]
- A Game-Theoretic Analysis of Cooperation in Anonymity NetworksMu Yang, Vladimiro Sassone, Sardaouna Hamadou. 269-289 [doi]
- Deciding Selective Declassification of Petri NetsEike Best, Philippe Darondeau. 290-308 [doi]
- Enforceable Security Policies RevisitedDavid A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu. 309-328 [doi]
- Towards Incrementalization of Holistic HyperpropertiesDimiter Milushev, Dave Clarke. 329-348 [doi]
- Type-Based Analysis of PKCS#11 Key ManagementMatteo Centenaro, Riccardo Focardi, Flaminia L. Luccio. 349-368 [doi]
- A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information FlowTorben Amtoft, Josiah Dodds, Zhi Zhang, Andrew W. Appel, Lennart Beringer, John Hatcliff, Xinming Ou, Andrew Cousino. 369-389 [doi]
- PTaCL: A Language for Attribute-Based Access Control in Open SystemsJason Crampton, Charles Morisset. 390-409 [doi]
- A Core Calculus for ProvenanceUmut A. Acar, Amal Ahmed, James Cheney, Roly Perera. 410-429 [doi]