Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/post/post2015.bht:"
@inproceedings{DBLP:conf/post/0001B0M15, author = {Michael Backes and Fabian Bendun and J{\"{o}}rg Hoffmann and Ninja Marnau}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {344--363}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_18}, doi = {10.1007/978-3-662-46666-7\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/0001B0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/0003S15, author = {Thanh Binh Nguyen and Christoph Sprenger}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Abstractions for Security Protocol Verification}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {196--215}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_11}, doi = {10.1007/978-3-662-46666-7\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/0003S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/AbadiI15, author = {Mart{\'{\i}}n Abadi and Michael Isard}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {On the Flow of Data, Information, and Time}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {73--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_5}, doi = {10.1007/978-3-662-46666-7\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/AbadiI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisCD15, author = {Myrto Arapinis and Vincent Cheval and St{\'{e}}phanie Delaune}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Composing Security Protocols: From Confidentiality to Privacy}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {324--343}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_17}, doi = {10.1007/978-3-662-46666-7\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ArapinisCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/AslanyanN15, author = {Zaruhi Aslanyan and Flemming Nielson}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Pareto Efficient Solutions of Attack-Defence Trees}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {95--114}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_6}, doi = {10.1007/978-3-662-46666-7\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/AslanyanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BeilkeR15, author = {Kristian Beilke and Volker Roth}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {A Safe Update Mechanism for Smart Cards}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {239--258}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_13}, doi = {10.1007/978-3-662-46666-7\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BeilkeR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChevalC15, author = {Vincent Cheval and V{\'{e}}ronique Cortier}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {280--299}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_15}, doi = {10.1007/978-3-662-46666-7\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChevalC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ChothiaSS15, author = {Tom Chothia and Ben Smyth and Christopher Staite}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Automatically Checking Commitment Protocols in ProVerif without False Attacks}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {137--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_8}, doi = {10.1007/978-3-662-46666-7\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/ChothiaSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/CortierEKMW15, author = {V{\'{e}}ronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Type-Based Verification of Electronic Voting Protocols}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {303--323}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_16}, doi = {10.1007/978-3-662-46666-7\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/CortierEKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DelftHS15, author = {Bart van Delft and Sebastian Hunt and David Sands}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Very Static Enforcement of Dynamic Policies}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {32--52}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_3}, doi = {10.1007/978-3-662-46666-7\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/DelftHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/Froschle15, author = {Sibylle B. Fr{\"{o}}schle}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Leakiness is Decidable for Well-Founded Protocols}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {176--195}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_10}, doi = {10.1007/978-3-662-46666-7\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/Froschle15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/HeuleSYMR15, author = {Stefan Heule and Deian Stefan and Edward Z. Yang and John C. Mitchell and Alejandro Russo}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {{IFC} Inside: Retrofitting Languages with Dynamic Information Flow Control}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {11--31}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_2}, doi = {10.1007/978-3-662-46666-7\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/HeuleSYMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/KanovichKNST15, author = {Max I. Kanovich and Tajana Ban Kirigin and Vivek Nigam and Andre Scedrov and Carolyn L. Talcott}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {259--279}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_14}, doi = {10.1007/978-3-662-46666-7\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/KanovichKNST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/Kunnemann15, author = {Robert K{\"{u}}nnemann}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Automated Backward Analysis of PKCS{\#}11 v2.20}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {219--238}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_12}, doi = {10.1007/978-3-662-46666-7\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/Kunnemann15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/MauwR15, author = {Sjouke Mauw and Sasa Radomirovic}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Generalizing Multi-party Contract Signing}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {156--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_9}, doi = {10.1007/978-3-662-46666-7\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/MauwR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/Palamidessi15, author = {Catuscia Palamidessi}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {3--7}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_1}, doi = {10.1007/978-3-662-46666-7\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/Palamidessi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/PetcherM15, author = {Adam Petcher and Greg Morrisett}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {The Foundational Cryptography Framework}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {53--72}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_4}, doi = {10.1007/978-3-662-46666-7\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/PetcherM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/TurkmenHRZ15, author = {Fatih Turkmen and Jerry den Hartog and Silvio Ranise and Nicola Zannone}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Analysis of {XACML} Policies with {SMT}}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {115--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_7}, doi = {10.1007/978-3-662-46666-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/TurkmenHRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2015, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7}, doi = {10.1007/978-3-662-46666-7}, isbn = {978-3-662-46665-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.