default search action
Search dblp for Publications
export results for "toc:db/conf/post/post2013.bht:"
@inproceedings{DBLP:conf/post/AbadiP13, author = {Mart{\'{\i}}n Abadi and J{\'{e}}r{\'{e}}my Planul}, editor = {David A. Basin and John C. Mitchell}, title = {On Layout Randomization for Arrays and Functions}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {167--185}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_9}, doi = {10.1007/978-3-642-36830-1\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/AbadiP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisCKR13, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer and Mark Ryan}, editor = {David A. Basin and John C. Mitchell}, title = {Practical Everlasting Privacy}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {21--40}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_2}, doi = {10.1007/978-3-642-36830-1\_2}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ArapinisCKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BackesBU13, author = {Michael Backes and Fabian Bendun and Dominique Unruh}, editor = {David A. Basin and John C. Mitchell}, title = {Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {206--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_11}, doi = {10.1007/978-3-642-36830-1\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BackesBU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BansalBDM13, author = {Chetan Bansal and Karthikeyan Bhargavan and Antoine Delignat{-}Lavaud and Sergio Maffeis}, editor = {David A. Basin and John C. Mitchell}, title = {Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {126--146}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_7}, doi = {10.1007/978-3-642-36830-1\_7}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/BansalBDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BartolettiCZ13, author = {Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino}, editor = {David A. Basin and John C. Mitchell}, title = {A Theory of Agreements and Protection}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {186--205}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_10}, doi = {10.1007/978-3-642-36830-1\_10}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BartolettiCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BugliesiCEM13, author = {Michele Bugliesi and Stefano Calzavara and Fabienne Eigner and Matteo Maffei}, editor = {David A. Basin and John C. Mitchell}, title = {Logical Foundations of Secure Resource Management in Protocol Implementations}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {105--125}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_6}, doi = {10.1007/978-3-642-36830-1\_6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BugliesiCEM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/CadeB13, author = {David Cad{\'{e}} and Bruno Blanchet}, editor = {David A. Basin and John C. Mitchell}, title = {Proved Generation of Implementations from Computationally Secure Protocol Specifications}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {63--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_4}, doi = {10.1007/978-3-642-36830-1\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/CadeB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/CarboneG13, author = {Marco Carbone and Joshua D. Guttman}, editor = {David A. Basin and John C. Mitchell}, title = {Sessions and Separability in Security Protocols}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {267--286}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_14}, doi = {10.1007/978-3-642-36830-1\_14}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/CarboneG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChevalB13, author = {Vincent Cheval and Bruno Blanchet}, editor = {David A. Basin and John C. Mitchell}, title = {Proving More Observational Equivalences with ProVerif}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {226--246}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_12}, doi = {10.1007/978-3-642-36830-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChevalB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChretienD13, author = {R{\'{e}}my Chr{\'{e}}tien and St{\'{e}}phanie Delaune}, editor = {David A. Basin and John C. Mitchell}, title = {Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {1--20}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_1}, doi = {10.1007/978-3-642-36830-1\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChretienD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DreierLL13, author = {Jannik Dreier and Pascal Lafourcade and Yassine Lakhnech}, editor = {David A. Basin and John C. Mitchell}, title = {Formal Verification of e-Auction Protocols}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {247--266}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_13}, doi = {10.1007/978-3-642-36830-1\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/DreierLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ElSalamounyCP13, author = {Ehab ElSalamouny and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, editor = {David A. Basin and John C. Mitchell}, title = {A Differentially Private Mechanism of Optimal Utility for a Region of Priors}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {41--62}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_3}, doi = {10.1007/978-3-642-36830-1\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ElSalamounyCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ModersheimNN13, author = {Sebastian M{\"{o}}dersheim and Flemming Nielson and Hanne Riis Nielson}, editor = {David A. Basin and John C. Mitchell}, title = {Lazy Mobile Intruders}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {147--166}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_8}, doi = {10.1007/978-3-642-36830-1\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ModersheimNN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/NguyenS13, author = {Thanh Binh Nguyen and Christoph Sprenger}, editor = {David A. Basin and John C. Mitchell}, title = {Sound Security Protocol Transformations}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {83--104}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_5}, doi = {10.1007/978-3-642-36830-1\_5}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/NguyenS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2013, editor = {David A. Basin and John C. Mitchell}, title = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1}, doi = {10.1007/978-3-642-36830-1}, isbn = {978-3-642-36829-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.