"Logic Wins!"
Higher-Order Program Verification and Language-Based Security
Deducibility Constraints
Automated Security Proof for Symmetric Encryption Modes
Noninterference with Dynamic Security Domains and Policies
A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers
A Logic for Formal Verification of Quantum Programs
Reducing Equational Theories for the Decision of Static Equivalence
A Simulation-Based Treatment of Authenticated Message Exchange
Trusted Deployment of Virtual Execution Environment in Grid Systems
A Dolev-Yao Model for Zero Knowledge
A Special Proxy Signature Scheme with Multi-warrant.