POST 2015 accepted papers

  • Martín Abadi and Michael Isard. On the flow of data, information, and time
  • Myrto Arapinis, Vincent Cheval and Stephanie Delaune. Composing security protocols: from confidentiality to privacy
  • Zaruhi Aslanyan and Flemming Nielson. Pareto efficient solutions of attack-defence trees
  • Michael Backes, Fabian Bendun, Jörg Hoffmann and Ninja Marnau. PriCL: creating a precedent, a framework for reasoning about privacy case law
  • Kristian Beilke and Volker Roth. A safe update mechanism for smart cards
  • Vincent Cheval and Veronique Cortier. Timing attacks in security protocols: symbolic framework and proof techniques
  • Tom Chothia, Ben Smyth and Christopher Staite. Automatically checking commitment protocols in ProVerif without false attacks
  • Veronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei and Cyrille Wiedling. Type-based verification of electronic voting protocols
  • Sibylle Froeschle. Leakiness is decidable for well-founded protocols
  • Stefan Heule, Deian Stefan, Edward Yang, John Mitchell and Alejandro Russo. IFC inside: retrofitting languages with dynamic information flow control
  • Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov and Carolyn Talcott. Discrete vs. dense times in the verification of cyber-physical security protocols
  • Robert Künnemann. Automated backward analysis of PKCS#11 v2.20
  • Sjouke Mauw and Sasa Radomirovic. Generalizing multi-party contract signing
  • Thanh Binh Nguyen and Christoph Sprenger. Abstractions for security protocol verification
  • Adam Petcher and Greg Morrisett. The foundational cryptography framework
  • Fatih Turkmen, Jerry den Hartog, Silvio Ranise and Nicola Zannone. Analysis of XACML policies with SMT
  • Bart van Delft, Sebastian Hunt and David Sands. Very static enforcement of dynamic policies

Who's online

We have 221 guests and no members online

Site Hosted by