Abstract is missing.
- Dispute Resolution in VotingDavid A. Basin, Sasa Radomirovic, Lara Schmid. 1-16 [doi]
- Fifty Shades of Ballot Privacy: Privacy against a Malicious BoardVéronique Cortier, Joseph Lallemand, Bogdan Warinschi. 17-32 [doi]
- Universal Unconditional Verifiability in E-Voting without Trusted PartiesVincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan. 33-48 [doi]
- SoK: Techniques for Verifiable Mix NetsThomas Haines, Johannes Müller 0001. 49-64 [doi]
- Transparent IFC Enforcement: Possibility and (In)Efficiency ResultsMaximilian Algehed, Cormac Flanagan. 65-78 [doi]
- VERONICA: Expressive and Precise Concurrent Information Flow SecurityDaniel Schoepe, Toby Murray, Andrei Sabelfeld. 79-94 [doi]
- Reconciling progress-insensitive noninterference and declassificationJohan Bay, Aslan Askarov. 95-106 [doi]
- Language-Based Web Session IntegrityStefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta. 107-122 [doi]
- First-Order Logic for Flow-Limited AuthorizationAndrew K. Hirsch, Pedro H. Azevedo de Amorim, Ethan Cecchetti, Ross Tate, Owen Arden. 123-138 [doi]
- Types and Abstract Interpretation for Authorization Hook AdviceChristian Skalka, David Darais, Trent Jaeger, Frank Capobianco. 139-152 [doi]
- Optimal Obfuscation Mechanisms via Machine LearningMarco Romanelli 0002, Kostantinos Chatzikokolakis 0001, Catuscia Palamidessi. 153-168 [doi]
- A Method for Proving Unlinkability of Stateful ProtocolsDavid Baelde, Stéphanie Delaune, Solène Moreau. 169-183 [doi]
- Abstracting Faceted ExecutionKristopher K. Micinski, David Darais, Thomas Gilray. 184-198 [doi]
- Nontransitive Security Types for Coarse-grained Information Flow ControlYi Lu 0003, Chenyi Zhang. 199-213 [doi]
- Securing Asynchronous ExceptionsCarlos Tomé Cortiñas, Marco Vassena, Alejandro Russo. 214-229 [doi]
- PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted LeakageAndreas Fischer 0011, Jonas Janneck, Järn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden. 230-245 [doi]
- Runtime Enforcement for Control System SecurityRuggero Lanotte, Massimo Merro, Andrei Munteanu. 246-261 [doi]
- Provably Secure Isolation for Interruptible Enclaved Execution on Small MicroprocessorsMatteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens. 262-276 [doi]
- Limiting the impact of unreliable randomness in deployed security protocolsLiliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan. 277-287 [doi]
- Authentication in Key-Exchange: Definitions, Relations and CompositionCyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi. 288-303 [doi]
- Automated Analysis of PUF-based ProtocolsRiccardo Focardi, Flaminia L. Luccio. 304-317 [doi]
- Anonymous Lottery In The Proof-of-Stake SettingFoteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou. 318-333 [doi]
- A Composable Security Treatment of the Lightning NetworkAggelos Kiayias, Orfeas Stefanos Thyfronitis Litos. 334-349 [doi]
- Clockwork: Tracking Remote Timing AttacksIulia Bastys, Musard Balliu, Tamara Rezk, Andrei Sabelfeld. 350-365 [doi]
- Controller Synthesis for HyperpropertiesBorzoo Bonakdarpour, Bernd Finkbeiner. 366-379 [doi]
- Rely/Guarantee Reasoning for Noninterference in Non-Blocking AlgorithmsNicholas Coughlin, Graeme Smith. 380-394 [doi]
- Exploiting attack-defense trees to find an optimal set of countermeasuresBarbara Fila, Wojciech Widel. 395-410 [doi]
- Provably Robust Decisions based on Potentially Malicious Sources of InformationTim Muller, Dongxia Wang, Jun Sun. 411-424 [doi]