Abstract is missing.
- Secure Two-Party Computation in Applied Pi-Calculus: Models and VerificationSergiu Bursuc. 1-15 [doi]
- Multiparty Testing PreordersRocco De Nicola, Hernán C. Melgratti. 16-31 [doi]
- Modular Monitor Extensions for Information Flow Security in JavaScriptJosé Fragoso Santos, Tamara Rezk, Ana Almeida Matos. 47-62 [doi]
- Hybrid Typing of Secure Information Flow in a JavaScript-Like LanguageJosé Fragoso Santos, Thomas Jensen, Tamara Rezk, Alan Schmitt. 63-78 [doi]
- Fault Ascription in Concurrent SystemsGregor Gößler, Jean-Bernard Stefani. 79-94 [doi]
- Disjunctive Information Flow for Communicating ProcessesXimeng Li, Flemming Nielson, Hanne Riis Nielson, Xinyu Feng. 95-111 [doi]
- Near-Optimal Scheduling for LTL with Future DiscountingShota Nakagawa, Ichiro Hasuo. 112-130 [doi]
- A Switch, in TimeLenore D. Zuck, Sanjiva Prasad. 131-146 [doi]
- Verification of Component-Based Systems via Predicate Abstraction and Simultaneous Set ReductionWang Qiang, Simon Bliudze. 147-162 [doi]