Document Type
|
:
|
BL
|
Record Number
|
:
|
866018
|
Main Entry
|
:
|
POST (Conference)(7th :2018 :, Thessalonikē, Greece)
|
Title & Author
|
:
|
Principles of security and trust : : 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /\ Lujo Bauer, Ralf Küsters (eds.).
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer Open,, 2018.
|
Series Statement
|
:
|
Advanced research in computing and software science
|
|
:
|
Lecture notes in computer science,; 10804
|
|
:
|
LNCS sublibrary. SL 4, Security and cryptology
|
Page. NO
|
:
|
1 online resource (xiv, 347 pages) :: illustrations
|
ISBN
|
:
|
3319897225
|
|
:
|
: 9783319897226
|
|
:
|
9783319897219
|
Notes
|
:
|
International conference proceedings.
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
|
Abstract
|
:
|
This book is Open Access under a CC BY licence.
|
Subject
|
:
|
Computer security, Congresses.
|
Subject
|
:
|
Data encryption (Computer science), Congresses.
|
Subject
|
:
|
Algorithms data structures.
|
Subject
|
:
|
Computer science.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computers-- Computer Science.
|
Subject
|
:
|
Computers-- Hardware-- Handheld Devices.
|
Subject
|
:
|
Computers-- Information Theory.
|
Subject
|
:
|
Computers-- Security-- General.
|
Subject
|
:
|
Computers-- Social Aspects-- Human-Computer Interaction.
|
Subject
|
:
|
Data encryption (Computer science)
|
Subject
|
:
|
Information technology: general issues.
|
Subject
|
:
|
Systems analysis design.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25P67 2018eb
|
Added Entry
|
:
|
Bauer, Lujo
|
|
:
|
Küsters, Ralf
|
Added Entry
|
:
|
ETAPS (Conference)(21st :2018 :, Thessalonikē , Greece)
|
Parallel Title
|
:
|
POST 2018
|