Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Principles of Security and Trust = 7...
~
Küsters, Ralf.
Principles of Security and Trust = 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Principles of Security and Trust/ edited by Lujo Bauer, Ralf Küsters.
Reminder of title:
7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
other author:
Bauer, Lujo.
Description:
XIV, 347 p. 85 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-319-89722-6
ISBN:
9783319897226
Principles of Security and Trust = 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
Principles of Security and Trust
7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /[electronic resource] :edited by Lujo Bauer, Ralf Küsters. - 1st ed. 2018. - XIV, 347 p. 85 illus.online resource. - Security and Cryptology ;10804. - Security and Cryptology ;9241.
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Open Access
This book is Open Access under a CC BY licence.
ISBN: 9783319897226
Standard No.: 10.1007/978-3-319-89722-6doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Principles of Security and Trust = 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
LDR
:02755nam a22004455i 4500
001
991656
003
DE-He213
005
20200703072338.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319897226
$9
978-3-319-89722-6
024
7
$a
10.1007/978-3-319-89722-6
$2
doi
035
$a
978-3-319-89722-6
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Principles of Security and Trust
$h
[electronic resource] :
$b
7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
$c
edited by Lujo Bauer, Ralf Küsters.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
XIV, 347 p. 85 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
10804
505
0
$a
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
506
0
$a
Open Access
520
$a
This book is Open Access under a CC BY licence.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Computer system failures.
$3
782237
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Theory of Computation.
$3
669322
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
System Performance and Evaluation.
$3
669346
700
1
$a
Bauer, Lujo.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1203534
700
1
$a
Küsters, Ralf.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1283332
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319897219
776
0 8
$i
Printed edition:
$z
9783319897233
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-319-89722-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
912
$a
ZDB-2-SOB
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login