Composition of password-based protocols Céline ChevalierStéphanie DelauneMark D. Ryan OriginalPaper 14 March 2013 Pages: 369 - 413
Applying string-rewriting to sequence-based specification Robert EschbachLan LinJesse H. Poore OriginalPaper 12 April 2013 Pages: 414 - 449
Verification and enforcement of access control policies Antonio CauHelge JanickeBen Moszkowski OriginalPaper 10 May 2013 Pages: 450 - 492
Symbolic unfolding of parametric stopwatch Petri nets Claude JardDidier LimeLouis-Marie Traonouez OriginalPaper 15 May 2013 Pages: 493 - 519
Modelling temporal behaviour in complex systems with Timebands Kun WeiJim WoodcockAlan Burns OriginalPaper 24 August 2013 Pages: 520 - 551
Beyond vacuity: towards the strongest passing formula Hana ChocklerArie GurfinkelOfer Strichman OriginalPaper 29 August 2013 Pages: 552 - 571