Abstract is missing.
- Verification of Security ProtocolsVéronique Cortier. 1 [doi]
- Abstractions Before ProofsCliff Jones. 2 [doi]
- Real Analysis for Complex SystemsAndré Platzer. 3 [doi]
- Mind the Gap: Formal Verification and the Common Criteria (Discussion Paper)Bernhard Beckert, Daniel Bruns, Sarah Grebing. 4-12 [doi]
- Automated Proof of Authentication Protocols in a Logic of EventsMark Bickford. 13-30 [doi]
- Program Verification via Craig Interpolation for Presburger Arithmetic with ArraysAngelo Brillout, Daniel Kroening, Philipp Rümmer, Thomas Wahl. 31-46 [doi]
- MCMT in the Land of Parametrized Timed AutomataAlessandro Carioni, Silvio Ghilardi, Silvio Ranise. 47-64 [doi]
- Automatic generation of high quality test sets via CBMCEmanuele Di Rosa, Enrico Giunchiglia, Massimo Narizzano, Gabriele Palma, Alessandra Puddu. 65-78 [doi]
- Composable Packages for Higher Order Logic TheoriesJoe Hurd. 79-93 [doi]
- User-friendly Support for Common Mathematical Concepts in a Lightweight VerifierAndrei Lapets. 94-109 [doi]
- Towards High-Assurance Multiprocessor VirtualisationMichael von Tessin. 110-125 [doi]
- Proving Simpson's Four-Slot Algorithm Using Ownership TransferShuling Wang, Xu Wang. 126-140 [doi]
- Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for SlicingDaniel Wasserrab, Denis Lohner. 141-155 [doi]