Abstract is missing.
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid VariablesReynald Affeldt, Hubert Comon-Lundh. 1-20 [doi]
- Validating Integrity for the Ephemerizer s Protocol with CL-AtseCharu Arora, Mathieu Turuani. 21-32 [doi]
- Computational Semantics for First-Order Logical Analysis of Cryptographic ProtocolsGergei Bana, Koji Hasebe, Mitsuhiro Okada. 33-56 [doi]
- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes GelatinClaude Barral, Assia Tria. 57-69 [doi]
- Comparing State Spaces in Automatic Security Protocol AnalysisCas J. F. Cremers, Pascal Lafourcade, Philippe Nadeau. 70-94 [doi]
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy SignaturesGeorg Fuchsbauer, David Pointcheval. 95-115 [doi]
- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to CommitmentYuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto. 116-137 [doi]
- New Anonymity Notions for Identity-Based EncryptionMalika Izabachène, David Pointcheval. 138-157 [doi]
- Computationally Sound Formalization of Rerandomizable RCCA Secure EncryptionYusuke Kawamoto, Hideki Sakurada, Masami Hagiya. 158-180 [doi]
- Writing an OS Kernel in a Strictly and Statically Typed LanguageToshiyuki Maeda, Akinori Yonezawa. 181-197 [doi]