04176nam 22008655 450 991029314010332120251225202046.09783319897226331989722510.1007/978-3-319-89722-6(CKB)4100000003359650(DE-He213)978-3-319-89722-6(MiAaPQ)EBC5578031(Au-PeEL)EBL5578031(OCoLC)1066185056(oapen)https://directory.doabooks.org/handle/20.500.12854/56986(PPN)226696596(MiAaPQ)EBC31734414(Au-PeEL)EBL31734414(OCoLC)1159386898(ScCtBLL)526743f0-16d5-43d2-a861-7955c4308592(OCoLC)1031399913(Perlego)2338109(oapen)doab56986(oapen)doab28093(EXLCZ)99410000000335965020180413d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierPrinciples of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /edited by Lujo Bauer, Ralf Küsters1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XIV, 347 p. 85 illus.) Security and Cryptology,2946-1863 ;108049783319897219 3319897217 Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.This book is Open Access under a CC BY licence.Security and Cryptology,2946-1863 ;10804Data protectionComputer scienceComputersData structures (Computer science)Information theoryElectronic digital computersEvaluationData and Information SecurityTheory of ComputationComputing MilieuxData Structures and Information TheorySystem Performance and EvaluationData protection.Computer science.Computers.Data structures (Computer science).Information theory.Electronic digital computersEvaluation.Data and Information Security.Theory of Computation.Computing Milieux.Data Structures and Information Theory.System Performance and Evaluation.005.8Ralf Küstersauth1354886Bauer Lujoedthttp://id.loc.gov/vocabulary/relators/edtKüsters Ralfedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910293140103321Principles of Security and Trust3358589UNINA