LEADER 04176nam 22008655 450 001 9910293140103321 005 20251225202046.0 010 $a9783319897226 010 $a3319897225 024 7 $a10.1007/978-3-319-89722-6 035 $a(CKB)4100000003359650 035 $a(DE-He213)978-3-319-89722-6 035 $a(MiAaPQ)EBC5578031 035 $a(Au-PeEL)EBL5578031 035 $a(OCoLC)1066185056 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/56986 035 $a(PPN)226696596 035 $a(MiAaPQ)EBC31734414 035 $a(Au-PeEL)EBL31734414 035 $a(OCoLC)1159386898 035 $a(ScCtBLL)526743f0-16d5-43d2-a861-7955c4308592 035 $a(OCoLC)1031399913 035 $a(Perlego)2338109 035 $a(oapen)doab56986 035 $a(oapen)doab28093 035 $a(EXLCZ)994100000003359650 100 $a20180413d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrinciples of Security and Trust $e7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /$fedited by Lujo Bauer, Ralf Küsters 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 347 p. 85 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10804 311 08$a9783319897219 311 08$a3319897217 327 $aInformation Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. 330 $aThis book is Open Access under a CC BY licence. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10804 606 $aData protection 606 $aComputer science 606 $aComputers 606 $aData structures (Computer science) 606 $aInformation theory 606 $aElectronic digital computers$xEvaluation 606 $aData and Information Security 606 $aTheory of Computation 606 $aComputing Milieux 606 $aData Structures and Information Theory 606 $aSystem Performance and Evaluation 615 0$aData protection. 615 0$aComputer science. 615 0$aComputers. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aElectronic digital computers$xEvaluation. 615 14$aData and Information Security. 615 24$aTheory of Computation. 615 24$aComputing Milieux. 615 24$aData Structures and Information Theory. 615 24$aSystem Performance and Evaluation. 676 $a005.8 700 $aRalf Küsters$4auth$01354886 702 $aBauer$b Lujo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKu?sters$b Ralf$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910293140103321 996 $aPrinciples of Security and Trust$93358589 997 $aUNINA