265 | -- | 266 | Heiko Mantel. Reliably secure software systems |
267 | -- | 272 | Tobias Nipkow, Andrei Popescu 0001. Making security type systems less ad hoc |
273 | -- | 279 | Bernd Finkbeiner, Markus N. Rabe. The linear-hyper-branching spectrum of temporal logics |
280 | -- | 287 | Gregor Snelting, Dennis Giffhorn, Jürgen Graf, Christian Hammer 0001, Martin Hecker, Martin Mohr, Daniel Wasserrab. Checking probabilistic noninterference using JOANA |
288 | -- | 293 | Sarah Ereth, Steffen Lortz, Matthias Perner. Confidentiality for Android apps: Specification and verification |
294 | -- | 299 | Thomas Bauereiß, Dieter Hutter. Information flow control for workflow management systems |
300 | -- | 306 | Ralf Küsters, Tomasz Truderung. Security in e-voting |
307 | -- | 309 | Björn Scheuermann. Designing networks for challenging applications |
310 | -- | 312 | Wim Martens. Theory for processing data on the Web |
313 | -- | 317 | Juraj Somorovsky. On the insecurity of XML Security |