21. CSF 2008: Pittsburgh, PA, USA

Language-Based Security

Security Models in Theory and Practice

Declassification and Erasure

CSF/LICS Joint Invited Talk

Authorization Logic I

Authorization Logic II

Protocol Analysis I

Cryptographic Foundations

Information Flow and Concurrency

Protocol Analysis II