


default search action
1st POST 2012: Tallinn, Estonia (Part of ETAPS 2012)
- Pierpaolo Degano, Joshua D. Guttman:
Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Lecture Notes in Computer Science 7215, Springer 2012, ISBN 978-3-642-28640-7 - Cynthia Dwork:
Differential Privacy and the Power of (Formalizing) Negative Thinking - (Extended Abstract). 1-2 - Bruno Blanchet:
Security Protocol Verification: Symbolic and Computational Models. 3-29 - Véronique Cortier, Jan Degrieck, Stéphanie Delaune:
Analysing Routing Protocols: Four Nodes Topologies Are Sufficient. 30-50 - Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan:
Parametric Verification of Address Space Separation. 51-68 - Miriam Paiola, Bruno Blanchet:
Verification of Security Protocols with Lists: From Length One to Unbounded Length. 69-88 - Myrto Arapinis, Sergiu Bursuc, Mark Ryan
:
Privacy Supporting Cloud Computing: ConfiChair, a Case Study. 89-108 - Véronique Cortier, Cyrille Wiedling:
A Formal Analysis of the Norwegian E-voting Protocol. 109-128 - David A. Basin, Cas Cremers, Simon Meier:
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. 129-148 - Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri:
Security Proof with Dishonest Keys. 149-168 - Myrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan
:
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity. 169-188 - Gergei Bana, Hubert Comon-Lundh:
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. 189-208 - Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Federico Olmedo
, Santiago Zanella-Béguelin
:
Verified Indifferentiable Hashing into Elliptic Curves. 209-228 - Anupam Datta, Divya Sharma, Arunesh Sinha
:
Provable De-anonymization of Large Datasets with Sparse Dimensions. 229-248 - Ting-Fang Yen, Michael K. Reiter:
Revisiting Botnet Models and Their Implications for Takedown Strategies. 249-268 - Mu Yang, Vladimiro Sassone, Sardaouna Hamadou:
A Game-Theoretic Analysis of Cooperation in Anonymity Networks. 269-289 - Eike Best, Philippe Darondeau:
Deciding Selective Declassification of Petri Nets. 290-308 - David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:
Enforceable Security Policies Revisited. 309-328 - Dimiter Milushev, Dave Clarke:
Towards Incrementalization of Holistic Hyperproperties. 329-348 - Matteo Centenaro, Riccardo Focardi
, Flaminia L. Luccio
:
Type-Based Analysis of PKCS#11 Key Management. 349-368 - Torben Amtoft
, Josiah Dodds, Zhi Zhang, Andrew W. Appel
, Lennart Beringer, John Hatcliff, Xinming Ou, Andrew Cousino:
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow. 369-389 - Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. 390-409 - Umut A. Acar, Amal Ahmed
, James Cheney
, Roly Perera
:
A Core Calculus for Provenance. 410-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.