


default search action
1st POST 2012: Tallinn, Estonia (Part of ETAPS 2012)
- Pierpaolo Degano, Joshua D. Guttman:

Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Lecture Notes in Computer Science 7215, Springer 2012, ISBN 978-3-642-28640-7 - Cynthia Dwork:

Differential Privacy and the Power of (Formalizing) Negative Thinking - (Extended Abstract). 1-2 - Bruno Blanchet:

Security Protocol Verification: Symbolic and Computational Models. 3-29 - Véronique Cortier, Jan Degrieck, Stéphanie Delaune:

Analysing Routing Protocols: Four Nodes Topologies Are Sufficient. 30-50 - Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan:

Parametric Verification of Address Space Separation. 51-68 - Miriam Paiola, Bruno Blanchet:

Verification of Security Protocols with Lists: From Length One to Unbounded Length. 69-88 - Myrto Arapinis, Sergiu Bursuc, Mark Ryan

:
Privacy Supporting Cloud Computing: ConfiChair, a Case Study. 89-108 - Véronique Cortier, Cyrille Wiedling:

A Formal Analysis of the Norwegian E-voting Protocol. 109-128 - David A. Basin, Cas Cremers, Simon Meier:

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. 129-148 - Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri:

Security Proof with Dishonest Keys. 149-168 - Myrto Arapinis, Sergiu Bursuc, Mark Dermot Ryan

:
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity. 169-188 - Gergei Bana, Hubert Comon-Lundh:

Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. 189-208 - Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Federico Olmedo

, Santiago Zanella-Béguelin
:
Verified Indifferentiable Hashing into Elliptic Curves. 209-228 - Anupam Datta, Divya Sharma, Arunesh Sinha

:
Provable De-anonymization of Large Datasets with Sparse Dimensions. 229-248 - Ting-Fang Yen, Michael K. Reiter:

Revisiting Botnet Models and Their Implications for Takedown Strategies. 249-268 - Mu Yang, Vladimiro Sassone, Sardaouna Hamadou:

A Game-Theoretic Analysis of Cooperation in Anonymity Networks. 269-289 - Eike Best, Philippe Darondeau:

Deciding Selective Declassification of Petri Nets. 290-308 - David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:

Enforceable Security Policies Revisited. 309-328 - Dimiter Milushev, Dave Clarke:

Towards Incrementalization of Holistic Hyperproperties. 329-348 - Matteo Centenaro, Riccardo Focardi

, Flaminia L. Luccio
:
Type-Based Analysis of PKCS#11 Key Management. 349-368 - Torben Amtoft

, Josiah Dodds, Zhi Zhang, Andrew W. Appel
, Lennart Beringer, John Hatcliff, Xinming Ou, Andrew Cousino:
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow. 369-389 - Jason Crampton, Charles Morisset:

PTaCL: A Language for Attribute-Based Access Control in Open Systems. 390-409 - Umut A. Acar, Amal Ahmed

, James Cheney
, Roly Perera
:
A Core Calculus for Provenance. 410-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














