Abstract is missing.
- Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset RewritingPetar Paradzik, Ante Derek. 1-16 [doi]
- Is Eve nearby? Analysing protocols under the distant-attacker assumptionReynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua. 17-32 [doi]
- A small bound on the number of sessions for security protocolsVéronique Cortier, Antoine Dallon, Stéphanie Delaune. 33-48 [doi]
- A Formal Model of Checked CLiyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks 0001. 49-63 [doi]
- SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking SimulationAkram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg 0001, Catalin Hritcu. 64-79 [doi]
- Proving full-system security properties under multiple attacker models on capability machinesThomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany, Frank Piessens, Lars Birkedal, Dominique Devriese. 80-95 [doi]
- Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive AttributesAlisa Pankova, Peeter Laud. 96-111 [doi]
- DPL: A Language for GDPR EnforcementFarzane Karami, David A. Basin, Einar Broch Johnsen. 112-129 [doi]
- Privacy as ReachabilitySébastien Gondron, Sebastian Mödersheim, Luca Viganò 0001. 130-146 [doi]
- N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet ArchitecturesThilo Weghorn, Si Liu, Christoph Sprenger 0001, Adrian Perrig, David A. Basin. 147-162 [doi]
- Applying consensus and replication securely with FLAQRPriyanka Mondal, Maximilian Algehed, Owen Arden. 163-178 [doi]
- How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative AnalysisDavid Mestel, Johannes Müller 0001, Pascal Reisert. 179-194 [doi]
- Contingent payments from two-party signing and verification for abelian groupsSergiu Bursuc, Sjouke Mauw. 195-210 [doi]
- Contingent payments from two-party signing and verification for abelian groupsSergiu Bursuc, Sjouke Mauw. 195-210 [doi]
- Collusion-Preserving Computation without a MediatorMichele Ciampi, Yun Lu 0001, Vassilis Zikas. 211-226 [doi]
- Bringing State-Separating Proofs to EasyCrypt A Security Proof for CryptoboxFrançois Dupressoir, Konrad Kohbrok, Sabine Oechsner. 227-242 [doi]
- IFCIL: An Information Flow Configuration Language for SELinuxLorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin. 243-259 [doi]
- Towards a General-Purpose Dynamic Information Flow PolicyPeixuan Li, Danfeng Zhang. 260-275 [doi]
- Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local gamesDavid Mestel. 276-288 [doi]
- Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof AssistantDavid Baelde, Stéphanie Delaune, Adrien Koutsos, Solène Moreau. 289-304 [doi]
- Exploiting Partial Order of Keys to Verify Security of a Vehicular Group ProtocolFelipe Boeira, Mikael Asplund. 305-318 [doi]
- Symbolic protocol verification with dice: process equivalences in the presence of probabilitiesVincent Cheval, Raphaëlle Crubillé, Steve Kremer. 319-334 [doi]
- Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & CoConstantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg. 335-347 [doi]
- Universal Optimality and Robust Utility Bounds for Metric Differential PrivacyNatasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding. 348-363 [doi]
- Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen PaymentsRoss Horne, Sjouke Mauw, Semen Yurkov. 364-379 [doi]
- Adversarial Robustness Verification and Attack Synthesis in Stochastic SystemsLisa Oakley, Alina Oprea, Stavros Tripakis. 380-395 [doi]
- The Complexity of Verifying Boolean Programs as Differentially PrivateMark Bun, Marco Gaboardi, Ludmila Glinskih. 396-411 [doi]
- Adversary Safety by Construction in a Language of Cryptographic ProtocolsTimothy M. Braje, Alice R. Lee, Andrew Wagner, Benjamin Kaiser, Daniel Park, Martine Kalke, Robert K. Cunningham, Adam Chlipala. 412-427 [doi]
- Legendre PRF (Multiple) Key Attacks and the Power of PreprocessingAlexander May 0001, Floyd Zweydinger. 428-438 [doi]
- A Complete Characterization of Security for Linicrypt Block Cipher ModesTommy Hollenberg, Mike Rosulek, Lawrence Roy. 439-454 [doi]
- Locked Circuit Indistinguishability: A Notion of Security for Logic LockingMohamed El Massad, Nahid Juma, Jonathan Shahen, Mariana Raykova 0001, Siddharth Garg, Mahesh Tripunitara. 455-470 [doi]
- Prophecy Variables for Hyperproperty VerificationRaven Beutner, Bernd Finkbeiner. 471-485 [doi]
- Mapping Synthesis for HyperpropertiesTzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, Stavros Tripakis. 486-500 [doi]