Abstract is missing.
- More Anonymous Onion Routing Through TrustAaron Johnson, Paul F. Syverson. 3-12 [doi]
- Minimal Message Complexity of Asynchronous Multi-party Contract SigningSjouke Mauw, Sasa Radomirovic, Mohammad Torabi Dashti. 13-25 [doi]
- Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by CodePhillip Rogaway, Till Stegers. 26-39 [doi]
- Tight Enforcement of Information-Release Policies for Dynamic LanguagesAslan Askarov, Andrei Sabelfeld. 43-59 [doi]
- Updatable Security ViewsJ. Nathan Foster, Benjamin C. Pierce, Steve Zdancewic. 60-74 [doi]
- Language-Based Isolation of Untrusted JavaScriptSergio Maffeis, Ankur Taly. 77-91 [doi]
- Securing Timeout Instructions in Web ApplicationsAlejandro Russo, Andrei Sabelfeld. 92-106 [doi]
- Modeling and Verifying Physical Properties of Security Protocols for Wireless NetworksPatrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun. 109-123 [doi]
- Cryptographic Protocol Synthesis and Verification for Multiparty SessionsKarthikeyan Bhargavan, Ricardo Corin, Pierre-Malo Deniélou, Cédric Fournet, James J. Leifer. 124-140 [doi]
- A Secure Cryptographic Token InterfaceChristian Cachin, Nishanth Chandran. 141-153 [doi]
- Using ProVerif to Analyze Protocols with Diffie-Hellman ExponentiationRalf Küsters, Tomasz Truderung. 157-171 [doi]
- ASPIER: An Automated Framework for Verifying Security Protocol ImplementationsSagar Chaki, Anupam Datta. 172-185 [doi]
- Inputs of Coma: Static Detection of Denial-of-Service VulnerabilitiesRichard M. Chang, Guofei Jiang, Franjo Ivancic, Sriram Sankaranarayanan, Vitaly Shmatikov. 186-199 [doi]
- Specification and Analysis of Dynamic Authorisation PoliciesMoritz Y. Becker. 203-217 [doi]
- Policy Compliance in Collaborative SystemsMax I. Kanovich, Paul Rowe, Andre Scedrov. 218-233 [doi]
- Advice from Belnap PoliciesChris Hankin, Flemming Nielson, Hanne Riis Nielson. 234-247 [doi]
- Expressive Power of Definite Clauses for Verifying AuthenticityGilberto Filé, Roberto Vigo. 251-265 [doi]
- A Method for Proving Observational EquivalenceVéronique Cortier, Stéphanie Delaune. 266-276 [doi]
- Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded ListsNajah Chridi, Mathieu Turuani, Michaël Rusinowitch. 277-289 [doi]
- Universally Composable Symmetric EncryptionRalf Küsters, Max Tuengerthal. 293-307 [doi]
- Achieving Security Despite Compromise Using Zero-knowledgeMichael Backes, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei. 308-323 [doi]
- A Provably Secure and Efficient Countermeasure against Timing AttacksBoris Köpf, Markus Dürmuth. 324-335 [doi]