Abstract is missing.
- Software-Based Memory Erasure with Relaxed Isolation RequirementsSergiu Bursuc, Reynaldo Gil Pons, Sjouke Mauw, Rolando Trujillo-Rasua. 1-16 [doi]
- A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary ResultsKarima Makhlouf, Tamara Stefanovic, Héber Hwang Arcolezi, Catuscia Palamidessi. 1-16 [doi]
- Solving the Insecurity Problem for AssertionsR. Ramanujam 0001, Vaishnavi Sundararajan, S. P. Suresh. 1-15 [doi]
- Epistemic Model Checking for PrivacyFortunat Rajaona, Ioana Boureanu, R. Ramanujam, Stephan Wesemeyer. 1-16 [doi]
- On Efficient and Secure Compression Functions for Arithmetization-Oriented HashingElena Andreeva 0001, Rishiraj Bhattacharyya, Arnab Roy 0005, Stefano Trevisani. 1-16 [doi]
- A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of TransitionsLaouen Fernet, Sebastian Mödersheim, Luca Viganò 0001. 17-32 [doi]
- Divide and Funnel: A Scaling Technique for Mix-NetworksDebajyoti Das 0001, Sebastian Meiser 0001, Esfandiar Mohammadi, Aniket Kate. 49-64 [doi]
- Deciding Branching Hyperproperties for Real Time SystemsNabarun Deka, Minjian Zhang 0002, Rohit Chadha, Mahesh Viswanathan 0001. 65-79 [doi]
- On Separation Logic, Computational Independence, and PseudorandomnessUgo Dal Lago, Davide Davoli 0001, Bruce M. Kapron. 80-95 [doi]
- Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under NondeterminismAtalay Mert Ileri, Nickolai Zeldovich, Adam Chlipala, M. Frans Kaashoek. 96-111 [doi]
- Brewer-Nash Scrutinised: Mechanised Checking of Policies Featuring Write RevocationAlfredo Capozucca, Maximiliano Cristiá, Ross Horne, Ricardo Katz. 112-126 [doi]
- Recent Latest Message Driven GHOST: Balancing Dynamic Availability With Asynchrony ResilienceFrancesco D'Amato, Luca Zanolini. 127-142 [doi]
- Consensus Redux: Distributed Ledgers in the Face of Adversarial SupremacyChristian Badertscher, Peter Gazi, Aggelos Kiayias, Alexander Russell, Vassilis Zikas. 143-158 [doi]
- Modeling Mobile Crash in Byzantine ConsensusHans Schmiedel, Runchao Han, Qiang Tang 0005, Ron Steinfeld, Jiangshan Yu. 159-171 [doi]
- A Maintainable Matrix Commitment Scheme with Constant-Size Public Parameters and Incremental AggregationWenhui Qiao, Liang Feng Zhang. 172-185 [doi]
- Is the JCJ voting system really coercion-resistant?Véronique Cortier, Pierrick Gaudry, Quentin Yang. 186-200 [doi]
- Accountable Bulletin Boards: Definition and Provably Secure ImplementationMike Graf 0001, Ralf Küsters, Daniel Rausch 0001, Simon Egger, Marvin Bechtold, Marcel Flinspach. 201-216 [doi]
- Publicly Auditable Privacy-Preserving Electoral RollsPrashant Agrawal, Mahabir Prasad Jhanwar, Subodh Vishnu Sharma, Subhashis Banerjee. 217-232 [doi]
- Bridging the Gap: Automated Analysis of SancusMatteo Busi 0001, Riccardo Focardi, Flaminia L. Luccio. 233-248 [doi]
- Wappler: Sound Reachability Analysis for WebAssemblyMarkus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Magdalena Solitro, Matteo Maffei. 249-264 [doi]
- Computationally Bounded Robust Compilation and Universally Composable SecurityRobert Künnemann, Marco Patrignani, Ethan Cecchetti. 265-278 [doi]
- CV2EC: Getting the Best of Both WorldsBruno Blanchet, Pierre Boutry, Christian Doczkal, Benjamin Grégoire, Pierre-Yves Strub. 279-294 [doi]
- Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSEManning Zhang, Zeshun Shi, Huanhuan Chen, Kaitai Liang. 311-323 [doi]
- A Probabilistic Logic for Concrete SecurityDavid Baelde, Caroline Fontaine, Adrien Koutsos, Guillaume Scerri, Théo Vignon. 324-339 [doi]
- Security Properties through the Lens of Modal LogicMatvey Soloviev, Musard Balliu, Roberto Guanciale. 340-355 [doi]
- A Logic of SattestationAaron D. Jaggard, Paul Syverson, Catherine Meadows 0001. 356-371 [doi]
- ZK-SecreC: a Domain-Specific Language for Zero-Knowledge ProofsDan Bogdanov, Joosep Jääger, Peeter Laud, Härmel Nestra, Martin Pettai, Jaak Randmets, Raul-Martin Rebane, Ville Sokk, Kert Tali, Sandhra-Mirella Valdma. 372-387 [doi]
- Disjunctive Policies for Database-Backed ProgramsAmir M. Ahmadian, Matvey Soloviev, Musard Balliu. 388-402 [doi]
- Relative Security: Formally Modeling and (Dis)Proving Resilience Against Semantic Optimization VulnerabilitiesBrijesh Dongol, Matt Griffin, Andrei Popescu, Jamie Wright. 403-418 [doi]
- Explaining ∊ in Local Differential Privacy Through the Lens of Quantitative Information FlowNatasha Fernandes, Annabelle McIver, Parastoo Sadeghi. 419-432 [doi]
- Secure Synthesis of Distributed Cryptographic ApplicationsCosku Acay, Joshua Gancher, Rolph Recto, Andrew C. Myers. 433-448 [doi]
- Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model CountingLisa Oakley, Steven Holtzen, Alina Oprea. 449-463 [doi]
- Nothing is Out-of-Band: Formal Modeling of CeremoniesBarbara Fila, Sasa Radomirovic. 464-478 [doi]
- Dealing with Dynamic Key Compromise in Crypto VerifBruno Blanchet. 495-510 [doi]
- Verification of Correctness and Security Properties for CRYSTALS-KYBERKatharina Kreuzer. 511-526 [doi]
- Circuit-Succinct Universally-Composable NIZKs with Updatable CRSBehzad Abdolmaleki, Noemi Glaeser, Sebastian Ramacher, Daniel Slamanig. 527-542 [doi]
- Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-ExchangesBruno Blanchet, Charlie Jacomme. 543-556 [doi]
- Unconditionally Secure MPC for Boolean Circuits With Constant Online CommunicationZhenkai Hu, Kang Yang 0002, Yu Yu 0001. 557-572 [doi]
- UniHand: Privacy-Preserving Universal Handover for Small-Cell Networks in 5G-Enabled Mobile Communication with KCI ResilienceRabiah Alnashwan, Prosanta Gope, Benjamin Dowling. 573-588 [doi]
- Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization ProcessPedram Hosseyni, Ralf Küsters, Tim Würtele. 589-604 [doi]
- Formal Verification of the Sumcheck ProtocolAzucena Garvía Bosshard, Jonathan Bootle, Christoph Sprenger 0001. 605-619 [doi]
- Provable Security Analysis of the Secure Remote Password ProtocolDennis Dayanikli, Anja Lehmann. 620-635 [doi]
- Urgency in Cybersecurity Risk Management: Toward a Solid TheoryZoltán Ádám Mann. 651-664 [doi]
- Attack Tree Metrics are Operad AlgebrasMilan Lopuhaä-Zwakenberg. 665-679 [doi]
- Composition in Differential Privacy for General Granularity NotionsPatricia Guerra-Balboa, Àlex Miranda-Pascual, Javier Parra-Arnau, Thorsten Strufe. 680-696 [doi]