POST 2016 accepted papers

Matthew Bauer, Rohit Chadha and Mahesh Viswanathan. Composing protocols with randomized actions
Juergen Graf, Martin Hecker, Martin Mohr and Gregor Snelting. Tool Demonstration: JOANA
Thomas Schmitz, Dustin Rhodes, Cormac Flanagan, Thomas Austin and Kenneth Knowles. Faceted Information Flow in Haskell via Control and Data Monads
Joachim Breitner, Juergen Graf, Martin Hecker, Martin Mohr and Gregor Snelting. On Improvements Of Low-Deterministic Security
Iulia Bolosteanu and Deepak Garg. Asymmetric Secure Multi-execution with Declassification
Quoc Huy Do, Nathan Wasser and Eduard Kamburjan. Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study
Nataliia Bielova and Tamara Rezk. A Taxonomy of Information Flow Monitors
Veronique Cortier, Antoine Dallon and Stephanie Delaune. Bounding the number of agents, for equivalence too
Kevin Falzon and Eric Bodden. Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels
Sebastian A. Mödersheim and Alessandro Bruni. AIF-omega: Set-Based Protocol Abstraction with Countable Families
Sepehr Amir-Mohammadian, Stephen Chong and Christian Skalka. Correct Audit Logging: Theory and Practice
Jian Xiong Shao, Yu Qin and Dengguo Feng. Computational Soundness Results for Stateful Applied pi Calculus
Holger Hermanns, Julia Krämer, Jan Krcal and Marielle Stoelinga. The Value of Attack-Defence Diagrams

Who's online

We have 90 guests and no members online

Site Hosted by