


default search action
4th POST 2015: London, UK
- Riccardo Focardi, Andrew C. Myers:

Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Lecture Notes in Computer Science 9036, Springer 2015, ISBN 978-3-662-46665-0
Invited Contribution
- Catuscia Palamidessi

:
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges. 3-7
Information Flow and Security Types
- Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo

:
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. 11-31 - Bart van Delft, Sebastian Hunt

, David Sands:
Very Static Enforcement of Dynamic Policies. 32-52 - Adam Petcher, Greg Morrisett:

The Foundational Cryptography Framework. 53-72 - Martín Abadi, Michael Isard:

On the Flow of Data, Information, and Time. 73-92
Risk Assessment and Security Policies
- Zaruhi Aslanyan, Flemming Nielson

:
Pareto Efficient Solutions of Attack-Defence Trees. 95-114 - Fatih Turkmen

, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Analysis of XACML Policies with SMT. 115-134
Protocols
- Tom Chothia, Ben Smyth, Christopher Staite:

Automatically Checking Commitment Protocols in ProVerif without False Attacks. 137-155 - Sjouke Mauw

, Sasa Radomirovic
:
Generalizing Multi-party Contract Signing. 156-175 - Sibylle B. Fröschle:

Leakiness is Decidable for Well-Founded Protocols. 176-195 - Thanh Binh Nguyen, Christoph Sprenger

:
Abstractions for Security Protocol Verification. 196-215
Hardware and Physical Security
- Robert Künnemann:

Automated Backward Analysis of PKCS#11 v2.20. 219-238 - Kristian Beilke, Volker Roth:

A Safe Update Mechanism for Smart Cards. 239-258 - Max I. Kanovich, Tajana Ban Kirigin

, Vivek Nigam, Andre Scedrov
, Carolyn L. Talcott:
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols. 259-279 - Vincent Cheval

, Véronique Cortier:
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques. 280-299
Privacy and Voting
- Véronique Cortier, Fabienne Eigner, Steve Kremer

, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. 303-323 - Myrto Arapinis, Vincent Cheval

, Stéphanie Delaune:
Composing Security Protocols: From Confidentiality to Privacy. 324-343 - Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau:

PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. 344-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














