Search dblp for Publications

export results for "toc:db/conf/post/post2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/post/0001B0M15,
  author       = {Michael Backes and
                  Fabian Bendun and
                  J{\"{o}}rg Hoffmann and
                  Ninja Marnau},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {PriCL: Creating a Precedent, a Framework for Reasoning about Privacy
                  Case Law},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {344--363},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_18},
  doi          = {10.1007/978-3-662-46666-7\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/0001B0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/0003S15,
  author       = {Thanh Binh Nguyen and
                  Christoph Sprenger},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Abstractions for Security Protocol Verification},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {196--215},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_11},
  doi          = {10.1007/978-3-662-46666-7\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/0003S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/AbadiI15,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Isard},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {On the Flow of Data, Information, and Time},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {73--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_5},
  doi          = {10.1007/978-3-662-46666-7\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AbadiI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisCD15,
  author       = {Myrto Arapinis and
                  Vincent Cheval and
                  St{\'{e}}phanie Delaune},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Composing Security Protocols: From Confidentiality to Privacy},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {324--343},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_17},
  doi          = {10.1007/978-3-662-46666-7\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/AslanyanN15,
  author       = {Zaruhi Aslanyan and
                  Flemming Nielson},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Pareto Efficient Solutions of Attack-Defence Trees},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {95--114},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_6},
  doi          = {10.1007/978-3-662-46666-7\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AslanyanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BeilkeR15,
  author       = {Kristian Beilke and
                  Volker Roth},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {A Safe Update Mechanism for Smart Cards},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {239--258},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_13},
  doi          = {10.1007/978-3-662-46666-7\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BeilkeR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChevalC15,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Timing Attacks in Security Protocols: Symbolic Framework and Proof
                  Techniques},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {280--299},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_15},
  doi          = {10.1007/978-3-662-46666-7\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChevalC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ChothiaSS15,
  author       = {Tom Chothia and
                  Ben Smyth and
                  Christopher Staite},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Automatically Checking Commitment Protocols in ProVerif without False
                  Attacks},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_8},
  doi          = {10.1007/978-3-662-46666-7\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/ChothiaSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CortierEKMW15,
  author       = {V{\'{e}}ronique Cortier and
                  Fabienne Eigner and
                  Steve Kremer and
                  Matteo Maffei and
                  Cyrille Wiedling},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Type-Based Verification of Electronic Voting Protocols},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {303--323},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_16},
  doi          = {10.1007/978-3-662-46666-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/CortierEKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/DelftHS15,
  author       = {Bart van Delft and
                  Sebastian Hunt and
                  David Sands},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Very Static Enforcement of Dynamic Policies},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {32--52},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_3},
  doi          = {10.1007/978-3-662-46666-7\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/DelftHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/Froschle15,
  author       = {Sibylle B. Fr{\"{o}}schle},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Leakiness is Decidable for Well-Founded Protocols},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {176--195},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_10},
  doi          = {10.1007/978-3-662-46666-7\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/Froschle15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/HeuleSYMR15,
  author       = {Stefan Heule and
                  Deian Stefan and
                  Edward Z. Yang and
                  John C. Mitchell and
                  Alejandro Russo},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {{IFC} Inside: Retrofitting Languages with Dynamic Information Flow
                  Control},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {11--31},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_2},
  doi          = {10.1007/978-3-662-46666-7\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/HeuleSYMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/KanovichKNST15,
  author       = {Max I. Kanovich and
                  Tajana Ban Kirigin and
                  Vivek Nigam and
                  Andre Scedrov and
                  Carolyn L. Talcott},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Discrete vs. Dense Times in the Analysis of Cyber-Physical Security
                  Protocols},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {259--279},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_14},
  doi          = {10.1007/978-3-662-46666-7\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/KanovichKNST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/Kunnemann15,
  author       = {Robert K{\"{u}}nnemann},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Automated Backward Analysis of PKCS{\#}11 v2.20},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_12},
  doi          = {10.1007/978-3-662-46666-7\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/Kunnemann15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/MauwR15,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Generalizing Multi-party Contract Signing},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_9},
  doi          = {10.1007/978-3-662-46666-7\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/MauwR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/Palamidessi15,
  author       = {Catuscia Palamidessi},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Quantitative Approaches to the Protection of Private Information:
                  State of the Art and Some Open Challenges},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {3--7},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_1},
  doi          = {10.1007/978-3-662-46666-7\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/Palamidessi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/PetcherM15,
  author       = {Adam Petcher and
                  Greg Morrisett},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {The Foundational Cryptography Framework},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {53--72},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_4},
  doi          = {10.1007/978-3-662-46666-7\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/PetcherM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/TurkmenHRZ15,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Silvio Ranise and
                  Nicola Zannone},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Analysis of {XACML} Policies with {SMT}},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_7},
  doi          = {10.1007/978-3-662-46666-7\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/TurkmenHRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2015,
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7},
  doi          = {10.1007/978-3-662-46666-7},
  isbn         = {978-3-662-46665-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics