Book Volume 7796 2013

Principles of Security and Trust

Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings

Editors:

ISBN: 978-3-642-36829-5 (Print) 978-3-642-36830-1 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages -

  2. Regular Papers

    1. No Access

      Chapter

      Pages 1-20

      Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks

    2. No Access

      Chapter

      Pages 21-40

      Practical Everlasting Privacy

    3. No Access

      Chapter

      Pages 41-62

      A Differentially Private Mechanism of Optimal Utility for a Region of Priors

    4. No Access

      Chapter

      Pages 63-82

      Proved Generation of Implementations from Computationally Secure Protocol Specifications

    5. No Access

      Chapter

      Pages 83-104

      Sound Security Protocol Transformations

    6. No Access

      Chapter

      Pages 105-125

      Logical Foundations of Secure Resource Management in Protocol Implementations

    7. No Access

      Chapter

      Pages 126-146

      Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage

    8. No Access

      Chapter

      Pages 147-166

      Lazy Mobile Intruders

    9. No Access

      Chapter

      Pages 167-185

      On Layout Randomization for Arrays and Functions

    10. No Access

      Chapter

      Pages 186-205

      A Theory of Agreements and Protection

    11. No Access

      Chapter

      Pages 206-225

      Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

    12. No Access

      Chapter

      Pages 226-246

      Proving More Observational Equivalences with ProVerif

    13. No Access

      Chapter

      Pages 247-266

      Formal Verification of e-Auction Protocols

    14. No Access

      Chapter

      Pages 267-286

      Sessions and Separability in Security Protocols

  3. Back Matter

    Pages -