Search dblp for Publications

export results for "toc:db/conf/post/post2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/post/AbadiP13,
  author       = {Mart{\'{\i}}n Abadi and
                  J{\'{e}}r{\'{e}}my Planul},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {On Layout Randomization for Arrays and Functions},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {167--185},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_9},
  doi          = {10.1007/978-3-642-36830-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AbadiP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCKR13,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Mark Ryan},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Practical Everlasting Privacy},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_2},
  doi          = {10.1007/978-3-642-36830-1\_2},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BackesBU13,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Dominique Unruh},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker
                  Assumptions and Mechanized Verification},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {206--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_11},
  doi          = {10.1007/978-3-642-36830-1\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BackesBU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BansalBDM13,
  author       = {Chetan Bansal and
                  Karthikeyan Bhargavan and
                  Antoine Delignat{-}Lavaud and
                  Sergio Maffeis},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted
                  Web Storage},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {126--146},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_7},
  doi          = {10.1007/978-3-642-36830-1\_7},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/BansalBDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BartolettiCZ13,
  author       = {Massimo Bartoletti and
                  Tiziana Cimoli and
                  Roberto Zunino},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {A Theory of Agreements and Protection},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {186--205},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_10},
  doi          = {10.1007/978-3-642-36830-1\_10},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BartolettiCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BugliesiCEM13,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Fabienne Eigner and
                  Matteo Maffei},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Logical Foundations of Secure Resource Management in Protocol Implementations},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {105--125},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_6},
  doi          = {10.1007/978-3-642-36830-1\_6},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BugliesiCEM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CadeB13,
  author       = {David Cad{\'{e}} and
                  Bruno Blanchet},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Proved Generation of Implementations from Computationally Secure Protocol
                  Specifications},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {63--82},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_4},
  doi          = {10.1007/978-3-642-36830-1\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/CadeB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CarboneG13,
  author       = {Marco Carbone and
                  Joshua D. Guttman},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Sessions and Separability in Security Protocols},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {267--286},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_14},
  doi          = {10.1007/978-3-642-36830-1\_14},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/CarboneG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChevalB13,
  author       = {Vincent Cheval and
                  Bruno Blanchet},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Proving More Observational Equivalences with ProVerif},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {226--246},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_12},
  doi          = {10.1007/978-3-642-36830-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChevalB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChretienD13,
  author       = {R{\'{e}}my Chr{\'{e}}tien and
                  St{\'{e}}phanie Delaune},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc
                  Networks},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_1},
  doi          = {10.1007/978-3-642-36830-1\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChretienD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/DreierLL13,
  author       = {Jannik Dreier and
                  Pascal Lafourcade and
                  Yassine Lakhnech},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Formal Verification of e-Auction Protocols},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_13},
  doi          = {10.1007/978-3-642-36830-1\_13},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/DreierLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ElSalamounyCP13,
  author       = {Ehab ElSalamouny and
                  Konstantinos Chatzikokolakis and
                  Catuscia Palamidessi},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {A Differentially Private Mechanism of Optimal Utility for a Region
                  of Priors},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {41--62},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_3},
  doi          = {10.1007/978-3-642-36830-1\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ElSalamounyCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ModersheimNN13,
  author       = {Sebastian M{\"{o}}dersheim and
                  Flemming Nielson and
                  Hanne Riis Nielson},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Lazy Mobile Intruders},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_8},
  doi          = {10.1007/978-3-642-36830-1\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ModersheimNN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/NguyenS13,
  author       = {Thanh Binh Nguyen and
                  Christoph Sprenger},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Sound Security Protocol Transformations},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {83--104},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_5},
  doi          = {10.1007/978-3-642-36830-1\_5},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/NguyenS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2013,
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1},
  doi          = {10.1007/978-3-642-36830-1},
  isbn         = {978-3-642-36829-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}