Principles of Security and Trust [E-Book] : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings / edited by David Basin, John C. Mitchell.
Basin, David.
Mitchell, John C.
Berlin, Heidelberg : Springer, 2013
XX, 287 p. 34 illus. digital.
Lecture notes in computer science ; 7796
Full Text
Table of Contents:
  • Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks
  • Practical Everlasting Privacy
  • A Differentially Private Mechanism of Optimal Utility for a Region of Priors
  • Proved Generation of Implementations from Computationally Secure Protocol Specifications
  • Sound Security Protocol Transformations
  • Logical Foundations of Secure Resource Management in Protocol Implementations
  • Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage
  • Lazy Mobile Intruders
  • On Layout Randomization for Arrays and Functions
  • A Theory of Agreements and Protection
  • Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification
  • Proving More Observational Equivalences with ProVerif
  • Formal Verification of e-Auction Protocols
  • Sessions and Separability in Security Protocols.