{"title":"Formal Analysis of the EMV Protocol Suite","authors":"Joeri de Ruiter, E. Poll","doi":"10.1007/978-3-642-27375-9_7","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_7","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Florent Jacquemard, É. Lozes, R. Treinen, Jules Villard
{"title":"Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus","authors":"Florent Jacquemard, É. Lozes, R. Treinen, Jules Villard","doi":"10.1007/978-3-642-27375-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_10","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Checking Secure Information Flow for Multi-threaded Programs","authors":"M. Huisman, Henri-Charles Blondeel","doi":"10.1007/978-3-642-27375-9_9","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_9","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructive Cryptography - A New Paradigm for Security Definitions and Proofs","authors":"U. Maurer","doi":"10.1007/978-3-642-27375-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_3","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128140451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Code Injection Prevention for Web Applications","authors":"Zhengqin Luo, Tamara Rezk, M. Serrano","doi":"10.1007/978-3-642-27375-9_11","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_11","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk
{"title":"G2C: Cryptographic Protocols from Goal-Driven Specifications","authors":"M. Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk","doi":"10.1007/978-3-642-27375-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_4","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"134 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Union and Intersection Types for Secure Protocol Implementations","authors":"M. Backes, Catalin Hritcu, Matteo Maffei","doi":"10.1007/978-3-642-27375-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_1","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Long-Term Signature Validation for Resolution of Dispute","authors":"Moez Ben MBarka, F. Krief, Olivier Ly","doi":"10.1007/978-3-642-27375-9_5","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_5","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR","authors":"S. Malladi","doi":"10.1007/978-3-642-27375-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_12","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Composition of Protocols","authors":"V. Cortier","doi":"10.1007/978-3-642-27375-9_2","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_2","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}