default search action
2nd POST 2013: Rome, Italy (Part of ETAPS 2013)
- David A. Basin, John C. Mitchell:
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Lecture Notes in Computer Science 7796, Springer 2013, ISBN 978-3-642-36829-5
Regular Papers
- Rémy Chrétien, Stéphanie Delaune:
Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks. 1-20 - Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan:
Practical Everlasting Privacy. 21-40 - Ehab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
A Differentially Private Mechanism of Optimal Utility for a Region of Priors. 41-62 - David Cadé, Bruno Blanchet:
Proved Generation of Implementations from Computationally Secure Protocol Specifications. 63-82 - Thanh Binh Nguyen, Christoph Sprenger:
Sound Security Protocol Transformations. 83-104 - Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei:
Logical Foundations of Secure Resource Management in Protocol Implementations. 105-125 - Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis:
Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage. 126-146 - Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson:
Lazy Mobile Intruders. 147-166 - Martín Abadi, Jérémy Planul:
On Layout Randomization for Arrays and Functions. 167-185 - Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino:
A Theory of Agreements and Protection. 186-205 - Michael Backes, Fabian Bendun, Dominique Unruh:
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification. 206-225 - Vincent Cheval, Bruno Blanchet:
Proving More Observational Equivalences with ProVerif. 226-246 - Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Formal Verification of e-Auction Protocols. 247-266 - Marco Carbone, Joshua D. Guttman:
Sessions and Separability in Security Protocols. 267-286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.