Book Volume 7796 2013

Principles of Security and Trust

Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings


ISBN: 978-3-642-36829-5 (Print) 978-3-642-36830-1 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages -

  2. Regular Papers

    1. Chapter

      Pages 1-20

      Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks

    2. Chapter

      Pages 21-40

      Practical Everlasting Privacy

    3. Chapter

      Pages 41-62

      A Differentially Private Mechanism of Optimal Utility for a Region of Priors

    4. Chapter

      Pages 63-82

      Proved Generation of Implementations from Computationally Secure Protocol Specifications

    5. Chapter

      Pages 83-104

      Sound Security Protocol Transformations

    6. Chapter

      Pages 105-125

      Logical Foundations of Secure Resource Management in Protocol Implementations

    7. Chapter

      Pages 126-146

      Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage

    8. Chapter

      Pages 147-166

      Lazy Mobile Intruders

    9. Chapter

      Pages 167-185

      On Layout Randomization for Arrays and Functions

    10. Chapter

      Pages 186-205

      A Theory of Agreements and Protection

    11. Chapter

      Pages 206-225

      Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

    12. Chapter

      Pages 226-246

      Proving More Observational Equivalences with ProVerif

    13. Chapter

      Pages 247-266

      Formal Verification of e-Auction Protocols

    14. Chapter

      Pages 267-286

      Sessions and Separability in Security Protocols

  3. Back Matter

    Pages -