Abstract is missing.
- Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc NetworksRémy Chrétien, Stéphanie Delaune. 1-20 [doi]
- Practical Everlasting PrivacyMyrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan. 21-40 [doi]
- A Differentially Private Mechanism of Optimal Utility for a Region of PriorsEhab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi. 41-62 [doi]
- Proved Generation of Implementations from Computationally Secure Protocol SpecificationsDavid Cadé, Bruno Blanchet. 63-82 [doi]
- Sound Security Protocol TransformationsBinh Thanh Nguyen, Christoph Sprenger. 83-104 [doi]
- Logical Foundations of Secure Resource Management in Protocol ImplementationsMichele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei. 105-125 [doi]
- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web StorageChetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis. 126-146 [doi]
- Lazy Mobile IntrudersSebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson. 147-166 [doi]
- On Layout Randomization for Arrays and FunctionsMartín Abadi, Jérémy Planul. 167-185 [doi]
- A Theory of Agreements and ProtectionMassimo Bartoletti, Tiziana Cimoli, Roberto Zunino. 186-205 [doi]
- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized VerificationMichael Backes, Fabian Bendun, Dominique Unruh. 206-225 [doi]
- Proving More Observational Equivalences with ProVerifVincent Cheval, Bruno Blanchet. 226-246 [doi]
- Formal Verification of e-Auction ProtocolsJannik Dreier, Pascal Lafourcade, Yassine Lakhnech. 247-266 [doi]
- Sessions and Separability in Security ProtocolsMarco Carbone, Joshua D. Guttman. 267-286 [doi]