


default search action
2nd POST 2013: Rome, Italy (Part of ETAPS 2013)
- David A. Basin, John C. Mitchell:

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Lecture Notes in Computer Science 7796, Springer 2013, ISBN 978-3-642-36829-5
Regular Papers
- Rémy Chrétien, Stéphanie Delaune:

Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks. 1-20 - Myrto Arapinis, Véronique Cortier, Steve Kremer

, Mark Ryan
:
Practical Everlasting Privacy. 21-40 - Ehab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi

:
A Differentially Private Mechanism of Optimal Utility for a Region of Priors. 41-62 - David Cadé, Bruno Blanchet:

Proved Generation of Implementations from Computationally Secure Protocol Specifications. 63-82 - Thanh Binh Nguyen, Christoph Sprenger

:
Sound Security Protocol Transformations. 83-104 - Michele Bugliesi

, Stefano Calzavara
, Fabienne Eigner, Matteo Maffei:
Logical Foundations of Secure Resource Management in Protocol Implementations. 105-125 - Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis

:
Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage. 126-146 - Sebastian Mödersheim

, Flemming Nielson
, Hanne Riis Nielson
:
Lazy Mobile Intruders. 147-166 - Martín Abadi, Jérémy Planul:

On Layout Randomization for Arrays and Functions. 167-185 - Massimo Bartoletti

, Tiziana Cimoli
, Roberto Zunino
:
A Theory of Agreements and Protection. 186-205 - Michael Backes, Fabian Bendun, Dominique Unruh

:
Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification. 206-225 - Vincent Cheval

, Bruno Blanchet
:
Proving More Observational Equivalences with ProVerif. 226-246 - Jannik Dreier, Pascal Lafourcade

, Yassine Lakhnech:
Formal Verification of e-Auction Protocols. 247-266 - Marco Carbone, Joshua D. Guttman

:
Sessions and Separability in Security Protocols. 267-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














