LEADER 03550nam 22008415 450 001 9910337564003321 005 20251225193628.0 010 $a9783030171384 010 $a3030171388 024 7 $a10.1007/978-3-030-17138-4 035 $a(CKB)4100000007823590 035 $a(DE-He213)978-3-030-17138-4 035 $a(MiAaPQ)EBC5922766 035 $a(Au-PeEL)EBL5922766 035 $a(OCoLC)1132418762 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/39604 035 $a(PPN)235668427 035 $a(MiAaPQ)EBC31734330 035 $a(Au-PeEL)EBL31734330 035 $a(OCoLC)1117483691 035 $a(EXLCZ)994100000007823590 100 $a20190402d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrinciples of Security and Trust $e8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6?11, 2019, Proceedings /$fedited by Flemming Nielson, David Sands 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 249 p. 2896 illus., 22 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11426 311 08$a9783030171377 311 08$a303017137X 327 $aFoundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of ?-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts. 330 $aThis book is Open Access under a CC BY licence. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11426 606 $aData protection 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aElectronic digital computers$xEvaluation 606 $aComputers 606 $aComputer science 606 $aData and Information Security 606 $aSoftware Engineering 606 $aArtificial Intelligence 606 $aSystem Performance and Evaluation 606 $aComputing Milieux 606 $aTheory of Computation 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aElectronic digital computers$xEvaluation. 615 0$aComputers. 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aSystem Performance and Evaluation. 615 24$aComputing Milieux. 615 24$aTheory of Computation. 676 $a005.8 676 $a005.8 700 $aNielson$b Flemming$4edt$0714740 702 $aNielson$b Flemming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSands$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337564003321 996 $aPrinciples of Security and Trust$93358691 997 $aUNINA