Abstract is missing.
- Security Evaluation of a Type of Table-Network Implementation of Block CiphersAkira Matsunaga, Tsutomu Matsumoto. 1-12 [doi]
- A Symbolic Intruder Model for Hash-Collision AttacksYannick Chevalier, Mounira Kourjieh. 13-27 [doi]
- A Denotational Approach to Scope-Based Compensable Flow Language for Web ServiceHuibiao Zhu, Geguang Pu, Jifeng He. 28-36 [doi]
- Certificateless Authenticated Two-Party Key Agreement ProtocolsTarjei K. Mandt, Chik-How Tan. 37-44 [doi]
- FORM : A Federated Rights Expression Model for Open DRM FrameworksThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia. 45-59 [doi]
- A Method of Safety Analysis for Runtime Code UpdateMasatomo Hashimoto. 60-74 [doi]
- Automata-Based Confidentiality MonitoringGurvan Le Guernic, Anindya Banerjee, Thomas P. Jensen, David A. Schmidt. 75-89 [doi]
- Efficient and Practical Control Flow Monitoring for Program SecurityNai Xia, Bing Mao, Qingkai Zeng, Li Xie. 90-104 [doi]
- Modular Formalization of Reactive Modules in COQMing-Hsien Tsai, Bow-Yaw Wang. 105-119 [doi]
- Closing Internal Timing Channels by TransformationAlejandro Russo, John Hughes, David A. Naumann, Andrei Sabelfeld. 120-135 [doi]
- Responsiveness in Process CalculiLucia Acciai, Michele Boreale. 136-150 [doi]
- Normal Proofs in Intruder TheoriesVincent Bernat, Hubert Comon-Lundh. 151-166 [doi]
- Breaking and Fixing Public-Key KerberosIliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad. 167-181 [doi]
- Computational Soundness of Formal Indistinguishability and Static EquivalenceGergei Bana, Payman Mohassel, Till Stegers. 182-196 [doi]
- Secrecy Analysis in Protocol Composition LogicArnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert. 197-213 [doi]
- A Type-Theoretic Framework for Formal Reasoning with Different Logical FoundationsZhaohui Luo. 214-222 [doi]
- On Completeness of Logical Relations for Monadic TypesSlawomir Lasota, David Nowak, Yu Zhang. 223-230 [doi]
- A Spatial Logical Characterisation of Context BisimulationZining Cao. 231-239 [doi]
- Information Hiding in the Join CalculusQin Ma, Luc Maranget. 240-247 [doi]
- Modeling Urgency in Component-Based Real-Time SystemsNguyen Van Tang, Dang Van Hung, Mizuhito Ogawa. 248-255 [doi]
- Maintaining Data Consistency of XML Databases Using Verification TechniquesKhandoker Asadul Islam, Yoshimichi Watanabe. 256-263 [doi]
- An Operational Semantics of Program Dependence Graphs for Unstructured ProgramsSouhei Ito, Shigeki Hagihara, Naoki Yonezaki. 264-271 [doi]
- Combination of Abstractions in the ASTRÉE Static AnalyzerPatrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival. 272-300 [doi]
- Proving Noninterference by a Fully Complete Translation to the Simply Typed lambda-CalculusNaokata Shikuma, Atsushi Igarashi. 301-315 [doi]
- Formalization of CTL* in Calculus of Inductive ConstructionsMing-Hsien Tsai, Bow-Yaw Wang. 316-330 [doi]
- Inferring Disjunctive PostconditionsCorneliu Popeea, Wei-Ngan Chin. 331-345 [doi]
- An Approach to Formal Verification of Arithmetic Functions in AssemblyReynald Affeldt, Nicolas Marti. 346-360 [doi]