POST 2013 accepted papers

You can find information about LNCS proceedings (LNCS 7796) at http://www.springeronline.com/978-3-642-36829-5 or access the online version at http://www.springerlink.com/content/978-3-642-36829-5/.

Binh Thanh Nguyen and Christoph Sprenger: Sound Security Protocol Transformations

Rémy Chrétien and Stéphanie Delaune: Formal analysis of privacy for routing protocols in mobile ad hoc networks

Vincent Cheval and Bruno Blanchet: Proving More Observational Equivalences with ProVerif

Myrto Arapinis, Veronique Cortier, Steve Kremer and Mark Ryan: Practical everlasting privacy

David Cadé and Bruno Blanchet: Proved Generation of Implementations from Computationally-Secure  Protocol Specifications

Michele Bugliesi, Stefano Calzavara, Fabienne Eigner and Matteo Maffei: Logical Foundations of Secure Resource Management in Protocol Implementations

Ehab Elsalamouny, Konstantinos Chatzikokolakis and Catuscia Palamidessi: A differentially private mechanism of optimal utility for a region of priors

Michael Backes, Fabian Bendun and Dominique Unruh: Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification

Jannik Dreier, Pascal Lafourcade and Yassine Lakhnech: Formal Verification of e-Auction protocols

Marco Carbone and Joshua Guttman: Sessions and Separability in Security Protocols

Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud and Sergio Maffeis: Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage

Sebastian A. Mödersheim, Flemming Nielson and Hanne Riis Nielson: Lazy Mobile Intruders

Massimo Bartoletti, Tiziana Cimoli and Roberto Zunino: A theory of agreements and protection

Martín Abadi and Jérémy Planul: On Layout Randomization for Arrays and Functions

Who's online

We have 50 guests and no members online

Site Hosted by

ETAPS 2013

logo_sapienza