LEADER 04716 am 22009493u 450 001 996465583103316 005 20230125185215.0 010 $a3-319-89722-5 024 7 $a10.1007/978-3-319-89722-6 035 $a(CKB)4100000003359650 035 $a(DE-He213)978-3-319-89722-6 035 $a(MiAaPQ)EBC5578031 035 $a(Au-PeEL)EBL5578031 035 $a(OCoLC)1066185056 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/56986 035 $a(PPN)226696596 035 $a(EXLCZ)994100000003359650 100 $a20180413d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrinciples of Security and Trust$b[electronic resource] $e7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /$fedited by Lujo Bauer, Ralf Küsters 205 $a1st ed. 2018. 210 $cSpringer Nature$d2018 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 347 p. 85 illus.) 225 1 $aSecurity and Cryptology ;$v10804 311 $a3-319-89721-7 327 $aInformation Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. 330 $aThis book is Open Access under a CC BY licence. 410 0$aSecurity and Cryptology ;$v10804 606 $aComputer security 606 $aComputers 606 $aData structures (Computer science) 606 $aComputer system failures 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 610 $asecurity analysis 610 $acryptography 610 $aprivacy 610 $aworld wide web 610 $asemantics 610 $aprogramming languages 610 $aformal specification 610 $aprogram compilers 610 $aspecifications 610 $aformal logic 610 $acomputer science 610 $aseparation logic 610 $aformal methods 610 $adata privacy 610 $asecurity systems 610 $asoftware engineering 610 $acomputer software selection and evaluation 610 $ainternet 610 $averification 610 $aauthentication 615 0$aComputer security. 615 0$aComputers. 615 0$aData structures (Computer science). 615 0$aComputer system failures. 615 14$aSystems and Data Security. 615 24$aTheory of Computation. 615 24$aComputing Milieux. 615 24$aData Structures and Information Theory. 615 24$aSystem Performance and Evaluation. 676 $a005.8 700 $aRalf Küsters$4auth$01354886 702 $aBauer$b Lujo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüsters$b Ralf$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465583103316 996 $aPrinciples of Security and Trust$93358589 997 $aUNISA