Author Index Volume 25 (2017)
Arden, O., see Liu, J. (4,5) 367–426
Assadsolimani, B., see Wüller, S. (1) 59– 81
Ban Kirigin, T., see Kanovich, M. (6) 585–630
Bauer, L., see Murray, T. (4,5) 319–321
Broberg, N., B. van Delft and D. Sands, Paragon – Practical programming with information flow control (4,5) 323–365
Carminati, M., see Continella, A. (2) 117–137
Chen, B. and R. Curtmola, Remote data integrity checking with server-side repair (6) 537–584
Cheng, Y., Y. Li, R. Deng, L. Ying and W. He, A study on a feasible no-root approach on Android (3) 231–253
Chi, M., see Choo, E. (3) 283–318
Choo, E., T. Yu and M. Chi, Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis (3) 283–318
Compagna, L., see dos Santos, D.R. (3) 255–282
Continella, A., M. Carminati, M. Polino, A. Lanzi, S. Zanero and F. Maggi, Prometheus: Analyzing WebInject-based information stealers (2) 117–137
Cortier, V. and C. Wiedling, A formal analysis of the Norwegian E-voting protocol (1) 21– 57
Crampton, J., N. Farley, G. Gutin, M. Jones and B. Poettering, Cryptographic enforcement of information flow policies without public information via tree partitions (6) 511–535
Crampton, J., G. Gutin, D. Karapetyan and R. Watrigant, The bi-objective workflow satisfiability problem and workflow resiliency (1) 83–115
Curtmola, R., see Chen, B. (6) 537–584
Deng, R., see Cheng, Y. (3) 231–253
dos Santos, D.R., S. Ranise, L. Compagna and S.E. Ponta, Automatically finding execution scenarios to deploy security-sensitive workflows (3) 255–282
Farley, N., see Crampton, J. (6) 511–535
Förg, F., see Wüller, S. (1) 59– 81
Gao, S., see Mohamed, M. (3) 205–230
George, M.D., see Liu, J. (4,5) 367–426
Giffin, D., A. Levy, D. Stefan, D. Terei, D. Mazières, J. Mitchell and A. Russo, Hails: Protecting data privacy in untrusted web applications (4,5) 427–461
Guan, A. and W.-G. Tzeng, A secret key establishment protocol for wireless networks using noisy channels (2) 139–151
Guggemos, T., see Migault, D. (2) 173–203
Gutin, G., see Crampton, J. (1) 83–115
Gutin, G., see Crampton, J. (6) 511–535
Halpern, J.Y., From qualitative to quantitative proofs of security properties using first-order conditional logic (1) 1– 19
He, W., see Cheng, Y. (3) 231–253
Jones, M., see Crampton, J. (6) 511–535
Kanovich, M., T. Ban Kirigin, V. Nigam, A. Scedrov and C. Talcott, Time, computational complexity, and probability in the analysis of distance-bounding protocols (6) 585–630
Karapetyan, D., see Crampton, J. (1) 83–115
Killian, S., see Migault, D. (2) 173–203
Kumaraguru, P., see Mohamed, M. (3) 205–230
Lanzi, A., see Continella, A. (2) 117–137
Laurent, M., see Migault, D. (2) 173–203
Levy, A., see Giffin, D. (4,5) 427–461
Li, Y., see Cheng, Y. (3) 231–253
Lin, C.-Y. and W.-G. Tzeng, Strategy analysis for cloud storage reliability management based on game theory (2) 153–171
Liu, J., O. Arden, M.D. George and A.C. Myers, Fabric: Building open distributed systems securely by construction (4,5) 367–426
Maggi, F., see Continella, A. (2) 117–137
Mayer, D., see Wüller, S. (1) 59– 81
Mazières, D., see Giffin, D. (4,5) 427–461
Meyer, U., see Wüller, S. (1) 59– 81
Migault, D., T. Guggemos, S. Killian, M. Laurent, G. Pujolle and J.P. Wary, Diet-ESP: IP layer security for IoT (2) 173–203
Mitchell, J., see Giffin, D. (4,5) 427–461
Mohamed, M., S. Gao, N. Sachdeva, N. Saxena, C. Zhang, P. Kumaraguru and P.C. Van Oorschot, On the security and usability of dynamic cognitive game CAPTCHAs (3) 205–230
Murray, T., A. Sabelfeld and L. Bauer, Guest Editorial. Special issue on verified information flow security (4,5) 319–321
Myers, A.C., see Liu, J. (4,5) 367–426
Nigam, V., see Kanovich, M. (6) 585–630
Poettering, B., see Crampton, J. (6) 511–535
Polino, M., see Continella, A. (2) 117–137
Ponta, S.E., see dos Santos, D.R. (3) 255–282
Pujolle, G., see Migault, D. (2) 173–203
Ranise, S., see dos Santos, D.R. (3) 255–282
Rocchetto, M., L. Viganò and M. Volpe, An interpolation-based method for the verification of security protocols (6) 463–510
Russo, A., see Giffin, D. (4,5) 427–461
Sabelfeld, A., see Murray, T. (4,5) 319–321
Sachdeva, N., see Mohamed, M. (3) 205–230
Sands, D., see Broberg, N. (4,5) 323–365
Saxena, N., see Mohamed, M. (3) 205–230
Scedrov, A., see Kanovich, M. (6) 585–630
Schüppen, S., see Wüller, S. (1) 59– 81
Stefan, D., see Giffin, D. (4,5) 427–461
Talcott, C., see Kanovich, M. (6) 585–630
Terei, D., see Giffin, D. (4,5) 427–461
Tzeng, W.-G., see Guan, A. (2) 139–151
Tzeng, W.-G., see Lin, C.-Y. (2) 153–171
van Delft, B., see Broberg, N. (4,5) 323–365
Van Oorschot, P.C., see Mohamed, M. (3) 205–230
Viganò, L., see Rocchetto, M. (6) 463–510
Volpe, M., see Rocchetto, M. (6) 463–510
Wary, J.P., see Migault, D. (2) 173–203
Watrigant, R., see Crampton, J. (1) 83–115
Wetzel, S., see Wüller, S. (1) 59– 81
Wiedling, C., see Cortier, V. (1) 21– 57
Wüller, S., D. Mayer, F. Förg, S. Schüppen, B. Assadsolimani, U. Meyer and S. Wetzel, Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques (1) 59– 81
Ying, L., see Cheng, Y. (3) 231–253
Yu, T., see Choo, E. (3) 283–318
Zanero, S., see Continella, A. (2) 117–137
Zhang, C., see Mohamed, M. (3) 205–230