POST 2012 Accepted Papers
Miriam Paiola and Bruno Blanchet.
Verification of security protocols with lists: from length one to unbounded length
Dimiter Milushev and Dave Clarke.
Towards Incrementalization of Holistic Hyperproperties
Ting-Fang Yen and Michael Reiter.
Revisiting Botnet Models and Their Implications for Takedown Strategies
Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan Mccune and Amit Vasudevan.
Parametric Verification of Address Space Separation
Eike Best and Philippe Darondeau.
Deciding Selective Declassification of Petri Nets
Veronique Cortier and Cyrille Wiedling.
A formal analysis of the Norwegian e-voting protocol
Hubert Comon-Lundh, Véronique Cortier and Guillaume Scerri.
Security proof with dishonest keys
Mu Yang, Vladimiro Sassone and Sardaouna Hamadou.
A Game-Theoretic Analysis of Cooperation in Anonymity Networks
Anupam Datta, Divya Sharma and Arunesh Sinha.
Provable De-anonymization of Large Datasets with Sparse Dimensions
Umut Acar, Amal Ahmed, James Cheney and Roly Perera.
A core calculus for provenance