Inductive study of confidentiality: for everyone Giampaolo Bella Original Article 23 June 2012 Pages: 3 - 36
Cryptographic protocols with everyday objects James HeatherSteve SchneiderVanessa Teague Original Article 02 March 2013 Pages: 37 - 62
Verifying anonymity in voting systems using CSP Murat MoranJames HeatherSteve Schneider Original Article 06 December 2012 Pages: 63 - 98
Formal verification of security protocol implementations: a survey Matteo AvalleAlfredo PirontiRiccardo Sisto Original Article 04 December 2012 Pages: 99 - 123
Safe abstractions of data encodings in formal security protocol models Alfredo PirontiRiccardo Sisto Original Article 13 November 2012 Pages: 125 - 167
Abstractions of non-interference security: probabilistic versus possibilistic T. S. HoangA. K. McIverE. Susatyo Original Article 13 June 2012 Pages: 169 - 194