Abstract is missing.
- The CaPiTo Approach to Protocol Validation - (Invited Talk)Flemming Nielson, Han Gao, Hanne Riis Nielson. 1 [doi]
- Reasoning about Probabilistic Security Using Task-PIOAsAaron D. Jaggard, Catherine Meadows, Michael Mislove, Roberto Segala. 2-22 [doi]
- Secrecy and Authenticity Types for Secure Distributed MessagingMichele Bugliesi, Stefano Calzavara, Damiano Macedonio. 23-40 [doi]
- Modular Plans for Secure Service CompositionGabriele Costa, Pierpaolo Degano, Fabio Martinelli. 41-58 [doi]
- A Type System for Access Control Views in Object-Oriented LanguagesMário Pires, Luís Caires. 59-76 [doi]
- Formal Analysis of Key Integrity in PKCS#11Andrea Falcone, Riccardo Focardi. 77-94 [doi]
- Secure Upgrade of Hardware Security Modules in Bank NetworksRiccardo Focardi, Flaminia L. Luccio. 95-110 [doi]
- Interactive Information Flow - (Invited Talk)Catuscia Palamidessi, Mário S. Alvim, Miguel E. Andrés. 111 [doi]
- Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social DomainTrajce Dimkov, Wolter Pieters, Pieter H. Hartel. 112-129 [doi]
- Match It or Die: Proving Integrity by EqualityMatteo Centenaro, Riccardo Focardi. 130-145 [doi]
- Towards Automatic Analysis of Election Verifiability PropertiesBen Smyth, Mark Ryan, Steve Kremer, Mounira Kourjieh. 146-163 [doi]
- AnBx - Security Protocols Design and VerificationMichele Bugliesi, Paolo Modesti. 164-184 [doi]