Abstract is missing.
- From Rational Number Reconstruction to Set Reconciliation and File SynchronizationAntoine Amarilli, Fabrice Ben Hamouda, Florian Bourse, Robin Morisset, David Naccache, Pablo Rauzy. 1-18 [doi]
- Affine Refinement Types for Authentication and AuthorizationMichele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei. 19-33 [doi]
- Seamless Distributed Computing from the Geometry of InteractionOlle Fredriksson, Dan R. Ghica. 34-48 [doi]
- A Beginner's Guide to the DeadLock Analysis ModelElena Giachino, Cosimo Laneve. 49-63 [doi]
- Formal Modeling and Reasoning about the Android Security FrameworkAlessandro Armando, Gabriele Costa, Alessio Merlo. 64-81 [doi]
- A Type System for Flexible Role Assignment in Multiparty Communicating SystemsPedro Baltazar, Luís Caires, Vasco T. Vasconcelos, Hugo Torres Vieira. 82-96 [doi]
- A Multiparty Multi-session LogicLaura Bocchi, Romain Demangeon, Nobuko Yoshida. 97-111 [doi]
- LTS Semantics for Compensation-Based ProcessesRoberto Bruni, Anne Kersten Kauer. 112-128 [doi]
- Linking UnlinkabilityMayla Brusò, Konstantinos Chatzikokolakis, Sandro Etalle, Jerry den Hartog. 129-144 [doi]
- Towards Quantitative Analysis of OpacityJeremy W. Bryans, Maciej Koutny, Chunyan Mu. 145-163 [doi]
- An Algebra for Symbolic Diffie-Hellman Protocol AnalysisDaniel J. Dougherty, Joshua D. Guttman. 164-181 [doi]
- Security Analysis in Probabilistic Distributed Protocols via Bounded ReachabilitySilvia S. Pelozo, Pedro R. D'Argenio. 182-197 [doi]
- Modular Reasoning about Differential Privacy in a Probabilistic Process CalculusLili Xu. 198-212 [doi]