POST 2015 accepted papers
- Martín Abadi and Michael Isard. On the flow of data, information, and time
- Myrto Arapinis, Vincent Cheval and Stephanie Delaune. Composing security protocols: from confidentiality to privacy
- Zaruhi Aslanyan and Flemming Nielson. Pareto efficient solutions of attack-defence trees
- Michael Backes, Fabian Bendun, Jörg Hoffmann and Ninja Marnau. PriCL: creating a precedent, a framework for reasoning about privacy case law
- Kristian Beilke and Volker Roth. A safe update mechanism for smart cards
- Vincent Cheval and Veronique Cortier. Timing attacks in security protocols: symbolic framework and proof techniques
- Tom Chothia, Ben Smyth and Christopher Staite. Automatically checking commitment protocols in ProVerif without false attacks
- Veronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei and Cyrille Wiedling. Type-based verification of electronic voting protocols
- Sibylle Froeschle. Leakiness is decidable for well-founded protocols
- Stefan Heule, Deian Stefan, Edward Yang, John Mitchell and Alejandro Russo. IFC inside: retrofitting languages with dynamic information flow control
- Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov and Carolyn Talcott. Discrete vs. dense times in the verification of cyber-physical security protocols
- Robert Künnemann. Automated backward analysis of PKCS#11 v2.20
- Sjouke Mauw and Sasa Radomirovic. Generalizing multi-party contract signing
- Thanh Binh Nguyen and Christoph Sprenger. Abstractions for security protocol verification
- Adam Petcher and Greg Morrisett. The foundational cryptography framework
- Fatih Turkmen, Jerry den Hartog, Silvio Ranise and Nicola Zannone. Analysis of XACML policies with SMT
- Bart van Delft, Sebastian Hunt and David Sands. Very static enforcement of dynamic policies