1 | -- | 2 | Pierpaolo Degano, Luca ViganĂ². Preface |
3 | -- | 22 | Carlos Caleiro, Luca ViganĂ², David A. Basin. Deconstructing Alice and Bob |
23 | -- | 38 | Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink. A Syntactic Criterion for Injectivity of Authentication Protocols |
39 | -- | 58 | Deepak D Souza, K. R. Raghavendra, Barbara Sprick. An Automata Based Approach for Verifying Information Flow Properties |
59 | -- | 77 | Alexey Gotsman, Fabio Massacci, Marco Pistore. Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language |
79 | -- | 94 | Kenji Imamoto, Kouichi Sakurai. Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic |
95 | -- | 114 | Monica Nesi, Giuseppina Rucci. Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting |
115 | -- | 134 | Christoffer Rosenkilde Nielsen, Esben Heltoft Andersen, Hanne Riis Nielson. Static Validation of a Voting Protocol |