POST 2012 Accepted Papers
	
		Miriam Paiola and Bruno Blanchet.
	
	
		Verification of security protocols with lists:  from length one to unbounded length
	
 
	
		Dimiter Milushev and Dave Clarke.
	
	
		Towards Incrementalization of Holistic Hyperproperties
	
 
	
		Ting-Fang Yen and Michael Reiter.
	
	
		Revisiting Botnet Models and Their Implications for Takedown Strategies
	
	
		Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan Mccune and Amit Vasudevan.
	
	
		Parametric Verification of Address Space Separation
	
 
	
		Eike Best and Philippe Darondeau.
	
	
		Deciding Selective Declassification of Petri Nets
	
	
		Veronique Cortier and Cyrille Wiedling.
	
	
		A formal analysis of the Norwegian e-voting protocol
	
 
	
		Hubert Comon-Lundh, Véronique Cortier and Guillaume Scerri.
	
	
		Security proof with dishonest keys
	
	
		Mu Yang, Vladimiro Sassone and Sardaouna Hamadou.
	
	
		A Game-Theoretic Analysis of Cooperation in Anonymity Networks
	
 
	
		Anupam Datta, Divya Sharma and Arunesh Sinha.
	
	
		Provable De-anonymization of Large Datasets with Sparse Dimensions
	
	
		Umut Acar, Amal Ahmed, James Cheney and Roly Perera.
	
	
		A core calculus for provenance