Principles of Security and Trust

Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings

Editors:

ISBN: 978-3-642-36829-5 (Print) 978-3-642-36830-1 (Online)

Table of contents (14 chapters)

  1. Front Matter

    Pages -

  2. Regular Papers

    1. No Access

      Book Chapter

      Pages 1-20

      Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks

    2. No Access

      Book Chapter

      Pages 21-40

      Practical Everlasting Privacy

    3. No Access

      Book Chapter

      Pages 41-62

      A Differentially Private Mechanism of Optimal Utility for a Region of Priors

    4. No Access

      Book Chapter

      Pages 63-82

      Proved Generation of Implementations from Computationally Secure Protocol Specifications

    5. No Access

      Book Chapter

      Pages 83-104

      Sound Security Protocol Transformations

    6. No Access

      Book Chapter

      Pages 105-125

      Logical Foundations of Secure Resource Management in Protocol Implementations

    7. No Access

      Book Chapter

      Pages 126-146

      Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage

    8. No Access

      Book Chapter

      Pages 147-166

      Lazy Mobile Intruders

    9. No Access

      Book Chapter

      Pages 167-185

      On Layout Randomization for Arrays and Functions

    10. No Access

      Book Chapter

      Pages 186-205

      A Theory of Agreements and Protection

    11. No Access

      Book Chapter

      Pages 206-225

      Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification

    12. No Access

      Book Chapter

      Pages 226-246

      Proving More Observational Equivalences with ProVerif

    13. No Access

      Book Chapter

      Pages 247-266

      Formal Verification of e-Auction Protocols

    14. No Access

      Book Chapter

      Pages 267-286

      Sessions and Separability in Security Protocols

  3. Back Matter

    Pages -