POST 2013 accepted papers
You can find information about LNCS proceedings (LNCS 7796) at http://www.springeronline.com/978-3-642-36829-5 or access the online version at http://www.springerlink.com/content/978-3-642-36829-5/.
Binh Thanh Nguyen and Christoph Sprenger: Sound Security Protocol Transformations
Rémy Chrétien and Stéphanie Delaune: Formal analysis of privacy for routing protocols in mobile ad hoc networks
Vincent Cheval and Bruno Blanchet: Proving More Observational Equivalences with ProVerif
Myrto Arapinis, Veronique Cortier, Steve Kremer and Mark Ryan: Practical everlasting privacy
David Cadé and Bruno Blanchet: Proved Generation of Implementations from Computationally-Secure Protocol Specifications
Michele Bugliesi, Stefano Calzavara, Fabienne Eigner and Matteo Maffei: Logical Foundations of Secure Resource Management in Protocol Implementations
Ehab Elsalamouny, Konstantinos Chatzikokolakis and Catuscia Palamidessi: A differentially private mechanism of optimal utility for a region of priors
Michael Backes, Fabian Bendun and Dominique Unruh: Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Jannik Dreier, Pascal Lafourcade and Yassine Lakhnech: Formal Verification of e-Auction protocols
Marco Carbone and Joshua Guttman: Sessions and Separability in Security Protocols
Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud and Sergio Maffeis: Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage
Sebastian A. Mödersheim, Flemming Nielson and Hanne Riis Nielson: Lazy Mobile Intruders
Massimo Bartoletti, Tiziana Cimoli and Roberto Zunino: A theory of agreements and protection
Martín Abadi and Jérémy Planul: On Layout Randomization for Arrays and Functions