1.

Record Nr.

UNISA996418747203316

Autore

COTTON, John <1584-1652.>

Titolo

The churches resurrection, or, The opening of the fift [sic] and sixt [sic] verses of the 20th chap. of the Revelation / by John Cotton ... and ... corrected by his own hand

Pubbl/distr/stampa

London, : Printed by R.O. & G.D. for Henry Overton, 1642

Descrizione fisica

Testo elettronico (PDF) (30 p.)

Disciplina

236.8

Soggetti

Resurrezione

Lingua di pubblicazione

Inglese

Formato

Risorsa elettronica

Livello bibliografico

Monografia

Note generali

Riproduzione dell'originale nella British Library

2.

Record Nr.

UNINA9910293140103321

Autore

Ralf Küsters

Titolo

Principles of Security and Trust : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018

ISBN

9783319897226

3319897225

Edizione

[1st ed. 2018.]

Descrizione fisica

1 online resource (XIV, 347 p. 85 illus.)

Collana

Security and Cryptology, , 2946-1863 ; ; 10804

Disciplina

005.8

Soggetti

Data protection

Computer science

Computers

Data structures (Computer science)

Information theory

Electronic digital computers - Evaluation

Data and Information Security

Theory of Computation

Computing Milieux

Data Structures and Information Theory



System Performance and Evaluation

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.

Sommario/riassunto

This book is Open Access under a CC BY licence.