Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic;...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Cham
Springer Nature
2018
|
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_28093 | ||
005 | 20210210 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210210s2018 xx |||||o ||| 0|eng d | ||
020 | |a 978-3-319-89722-6 | ||
020 | |a 9783319897226 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1007/978-3-319-89722-6 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UY |2 bicssc | |
100 | 1 | |a Bauer, Lujo |4 edt | |
700 | 1 | |a Küsters, Ralf |4 edt | |
700 | 1 | |a Bauer, Lujo |4 oth | |
700 | 1 | |a Küsters, Ralf |4 oth | |
245 | 1 | 0 | |a Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings |
260 | |a Cham |b Springer Nature |c 2018 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Security and Cryptology | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic; software engineering; specifications; verification; world wide web | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Computer science |2 bicssc | |
653 | |a authentication | ||
653 | |a computer science | ||
653 | |a computer software selection and evaluation | ||
653 | |a cryptography | ||
653 | |a data privacy | ||
653 | |a formal logic | ||
653 | |a formal methods | ||
653 | |a formal specification | ||
653 | |a internet | ||
653 | |a privacy | ||
653 | |a program compilers | ||
653 | |a programming languages | ||
653 | |a security analysis | ||
653 | |a security systems | ||
653 | |a semantics | ||
653 | |a separation logic | ||
653 | |a software engineering | ||
653 | |a specifications | ||
653 | |a verification | ||
653 | |a world wide web | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/27744/1/1002261.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/27744/1/1002261.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/27744/1/1002261.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/28093 |7 0 |z DOAB: description of the publication |