Verifying Cryptographic Code in C: Some Experience and the Csec Challenge / Mikhail Aizatulin ; François Dupressoir ; Andrew D. Gordon ; Jan Jülrjens |
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation / Willem De Groef ; Dominique Devriese ; Frank Piessens |
Differential Privacy: On the Trade-Off between Utility and Information Leakage / Mário S. Alvim ; Miguel E. Andrés ; Konstantinos Chatzikokolakis ; Pierpaolo Degano ; Catuscia Palamidessi |
On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow / Luciano Bello ; Eduardo Bonelli |
Min-Entropy Leakage of Channels in Cascade / Barbara Espinoza ; Geoffrey Smith |
Secure Recharge of Disposable RFID Tickets / Riccardo Focardi ; Flaminia L. Luccio |
Avoiding Delegation Subterfuge Using Linked Local Permission Names / Simon N. Foley ; Samane Abdi |
Verifiable Control Flow Policies for Java Bytecode / Arnaud Fontaine ; Samuel Hym ; Isabelle Simplot-Ryl |
Concepts and Proofs for Configuring PKCS#11 / Sibylle Fröschle ; Nils Sommer |
Service Automata / Richard Gay ; Heiko Mantel ; Barbara Sprick |
Analysing Applications Layered on Unilaterally Authenticating Protocols / Thomas Gibson-Robinson ; Gavin Lowe |
Type-Based Enforcement of Secure Programming Guidelines û Code Injection Prevention at SAP / Robert Grabowski ; Martin Hofmann ; Keqin Li |
TBA: A Hybrid of Logic and Extensional Access Control Systems / Timothy L. Hinrichs ; William C. Garrison III ; Adam J. Lee ; Skip Saunders ; John C. Mitchell |
Diffie-Hellman without Difficulty / Sebastian Mödersheim |
Is Cryptyc Able to Detect Insider Attacks? / Behnam Sattarzadeh ; Mehran S. Fallah |
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes / Ben Smyth ; Mark Ryan ; Liqun Chen |
Risk Balance in Optimistic Non-repudiation Protocols / Mohammad Torabi Dashti ; Jan Cederquist ; Yanjing Wang |
Author Index |
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge / Mikhail Aizatulin ; François Dupressoir ; Andrew D. Gordon ; Jan Jülrjens |
Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation / Willem De Groef ; Dominique Devriese ; Frank Piessens |
Differential Privacy: On the Trade-Off between Utility and Information Leakage / Mário S. Alvim ; Miguel E. Andrés ; Konstantinos Chatzikokolakis ; Pierpaolo Degano ; Catuscia Palamidessi |
On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow / Luciano Bello ; Eduardo Bonelli |
Min-Entropy Leakage of Channels in Cascade / Barbara Espinoza ; Geoffrey Smith |
Secure Recharge of Disposable RFID Tickets / Riccardo Focardi ; Flaminia L. Luccio |