Abstract is missing.
- Union and Intersection Types for Secure Protocol ImplementationsMichael Backes, Catalin Hritcu, Matteo Maffei. 1-28 [doi]
- Secure Composition of ProtocolsVéronique Cortier. 29-32 [doi]
- Constructive Cryptography - A New Paradigm for Security Definitions and ProofsUeli Maurer. 33-56 [doi]
- G2C: Cryptographic Protocols from Goal-Driven SpecificationsMichael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk. 57-77 [doi]
- Modeling Long-Term Signature Validation for Resolution of DisputeMoez Ben MBarka, Francine Krief, Olivier Ly. 78-97 [doi]
- Formal Analysis of Privacy for Anonymous Location Based ServicesMorten Dahl, Stéphanie Delaune, Graham Steel. 98-112 [doi]
- Formal Analysis of the EMV Protocol SuiteJoeri de Ruiter, Erik Poll. 113-129 [doi]
- Security Goals and Protocol TransformationsJoshua D. Guttman. 130-147 [doi]
- Model-Checking Secure Information Flow for Multi-threaded ProgramsMarieke Huisman, Henri-Charles Blondeel. 148-165 [doi]
- Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-CalculusFlorent Jacquemard, Étienne Lozes, Ralf Treinen, Jules Villard. 166-185 [doi]
- Automated Code Injection Prevention for Web ApplicationsZhengqin Luo, Tamara Rezk, Manuel Serrano. 186-204 [doi]
- Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-ORSreekanth Malladi. 205-224 [doi]