Abstract is missing.
- Quantifying and Qualifying Trust: Spectral Decomposition of Trust NetworksDusko Pavlovic. 1-17 [doi]
- Bounded Memory Dolev-Yao Adversaries in Collaborative SystemsMax I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov. 18-33 [doi]
- Efficient Decision Procedures for Message Deducibility and Static EquivalenceBruno Conchinha, David A. Basin, Carlos Caleiro. 34-49 [doi]
- Understanding Abstractions of Secure ChannelsAllaa Kamil, Gavin Lowe. 50-64 [doi]
- Information Flow Analysis via Path Condition RefinementMana Taghdiri, Gregor Snelting, Carsten Sinz. 65-79 [doi]
- Foundations of Attack-Defense TreesBarbara Kordy, Sjouke Mauw, Sasa Radomirovic, Patrick Schweitzer. 80-95 [doi]
- Reasoning with Past to Prove PKCS#11 Keys SecureSibylle B. Fröschle, Nils Sommer. 96-110 [doi]
- A Formal Analysis of Authentication in the TPMStéphanie Delaune, Steve Kremer, Mark Dermot Ryan, Graham Steel. 111-125 [doi]
- Modeling Identity-Related Properties and Their Privacy StrengthMeilof Veeningen, Benne de Weger, Nicola Zannone. 126-140 [doi]
- Semantics of TrustTim Muller. 141-156 [doi]
- Semi-automatic Synthesis of Security Policies by Invariant-Guided AbductionClément Hurlin, Hélène Kirchner. 157-175 [doi]
- Corrective Enforcement of Security PoliciesRaphael Khoury, Nadia Tawbi. 176-190 [doi]
- Cryptographic Enforcement of Role-Based Access ControlJason Crampton. 191-205 [doi]
- A Calculus for the Analysis of Wireless Network Security ProtocolsFrancesco Ballardin, Massimo Merro. 206-222 [doi]
- Analysis of a Receipt-Free Auction Protocol in the Applied Pi CalculusNaipeng Dong, Hugo L. Jonker, Jun Pang. 223-238 [doi]