Abstract is missing.
- Verifying Cryptographic Code in C: Some Experience and the Csec ChallengeMihhail Aizatulin, François Dupressoir, Andrew D. Gordon, Jan Jürjens. 1-20 [doi]
- Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New ImplementationWillem De Groef, Dominique Devriese, Frank Piessens. 21-38 [doi]
- Differential Privacy: On the Trade-Off between Utility and Information LeakageMário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, Catuscia Palamidessi. 39-54 [doi]
- On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information FlowLuciano Bello, Eduardo Bonelli. 55-69 [doi]
- Min-Entropy Leakage of Channels in CascadeBarbara Espinoza, Geoffrey Smith. 70-84 [doi]
- Secure Recharge of Disposable RFID TicketsRiccardo Focardi, Flaminia L. Luccio. 85-99 [doi]
- Avoiding Delegation Subterfuge Using Linked Local Permission NamesSimon N. Foley, Samane Abdi. 100-114 [doi]
- Verifiable Control Flow Policies for Java BytecodeArnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl. 115-130 [doi]
- Concepts and Proofs for Configuring PKCS#11Sibylle B. Fröschle, Nils Sommer. 131-147 [doi]
- Service AutomataRichard Gay, Heiko Mantel, Barbara Sprick. 148-163 [doi]
- Analysing Applications Layered on Unilaterally Authenticating ProtocolsThomas Gibson-Robinson, Gavin Lowe. 164-181 [doi]
- Type-Based Enforcement of Secure Programming Guidelines - Code Injection Prevention at SAPRobert Grabowski, Martin Hofmann, Keqin Li 0002. 182-197 [doi]
- TBA : A Hybrid of Logic and Extensional Access Control SystemsTimothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, John C. Mitchell. 198-213 [doi]
- Diffie-Hellman without DifficultySebastian Mödersheim. 214-229 [doi]
- Is Cryptyc Able to Detect Insider Attacks?Behnam Sattarzadeh, Mehran S. Fallah. 230-244 [doi]
- Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation SchemesBen Smyth, Mark Ryan, Liqun Chen. 245-262 [doi]
- Risk Balance in Optimistic Non-repudiation ProtocolsMohammad Torabi Dashti, Jan Cederquist, Yanjing Wang. 263-277 [doi]