Abstract is missing.
- Foundations for Parallel Information Flow Control Runtime SystemsMarco Vassena, Gary Soeller, Peter Amidon, Matthew Chan, John Renner, Deian Stefan. 1-28 [doi]
- A Formal Analysis of Timing Channel Security via BucketingTachio Terauchi, Timos Antonopoulos. 29-50 [doi]
- A Dependently Typed Library for Static Information-Flow Control in IdrisSimon Gregersen, Søren Eller Thomsen, Aslan Askarov. 51-75 [doi]
- Achieving Safety Incrementally with Checked CAndrew Ruef, Leonidas Lampropoulos, Ian Sweet, David Tarditi, Michael Hicks 0001. 76-98 [doi]
- \textsc Wys^\star : A DSL for Verified Secure Multi-party ComputationsAseem Rastogi, Nikhil Swamy, Michael Hicks 0001. 99-122 [doi]
- Generalised Differential Privacy for Text Document ProcessingNatasha Fernandes, Mark Dras, Annabelle McIver. 123-148 [doi]
- Symbolic Verification of Distance Bounding ProtocolsAlexandre Debant, Stéphanie Delaune. 149-174 [doi]
- On the Formalisation of \varSigma -Protocols and Commitment SchemesDavid Butler, David Aspinall 0001, Adrià Gascón. 175-196 [doi]
- Orchestrating Layered AttestationsJohn D. Ramsdell, Paul D. Rowe, Perry Alexander, Sarah Helble, Peter Loscocco, J. Aaron Pendergrass, Adam Petz. 197-221 [doi]
- Verifying Liquidity of Bitcoin ContractsMassimo Bartoletti, Roberto Zunino. 222-247 [doi]