Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
This book is Open Access under a CC BY licence.
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Edition: | 1st ed. 2018. |
Series: | Security and Cryptology,
10804 |
Subjects: | |
Online Access: | Link to Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | 978-3-319-89722-6 | ||
003 | DE-He213 | ||
005 | 20240314163626.0 | ||
007 | cr nn 008mamaa | ||
008 | 180413s2018 sz | s |||| 0|eng d | ||
020 | |a 9783319897226 |9 978-3-319-89722-6 | ||
024 | 7 | |a 10.1007/978-3-319-89722-6 |2 doi | |
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a UR |2 thema | |
072 | 7 | |a UTN |2 thema | |
082 | 0 | 4 | |a 005.8 |2 23 |
245 | 1 | 0 | |a Principles of Security and Trust |h [electronic resource] : |b 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / |c edited by Lujo Bauer, Ralf Küsters. |
250 | |a 1st ed. 2018. | ||
264 | 1 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2018. | |
300 | |a XIV, 347 p. 85 illus. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Security and Cryptology, |x 2946-1863 ; |v 10804 | |
505 | 0 | |a Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. | |
506 | 0 | |a Open Access | |
520 | |a This book is Open Access under a CC BY licence. | ||
650 | 0 | |a Data protection. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Computers. | |
650 | 0 | |a Data structures (Computer science). | |
650 | 0 | |a Information theory. | |
650 | 0 | |a Electronic digital computers |x Evaluation. | |
650 | 1 | 4 | |a Data and Information Security. |
650 | 2 | 4 | |a Theory of Computation. |
650 | 2 | 4 | |a Computing Milieux. |
650 | 2 | 4 | |a Data Structures and Information Theory. |
650 | 2 | 4 | |a System Performance and Evaluation. |
700 | 1 | |a Bauer, Lujo. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Küsters, Ralf. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Nature eBook | |
776 | 0 | 8 | |i Printed edition: |z 9783319897219 |
776 | 0 | 8 | |i Printed edition: |z 9783319897233 |
830 | 0 | |a Security and Cryptology, |x 2946-1863 ; |v 10804 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-89722-6 |z Link to Metadata |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-SXCS | ||
912 | |a ZDB-2-LNC | ||
912 | |a ZDB-2-SOB | ||
950 | |a Computer Science (SpringerNature-11645) | ||
950 | |a Computer Science (R0) (SpringerNature-43710) |