LEADER 04037 am 22008293u 450 001 996466304203316 005 20230125203353.0 010 $a3-030-17138-8 024 7 $a10.1007/978-3-030-17138-4 035 $a(CKB)4100000007823590 035 $a(DE-He213)978-3-030-17138-4 035 $a(MiAaPQ)EBC5922766 035 $a(Au-PeEL)EBL5922766 035 $a(OCoLC)1132418762 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/39604 035 $a(PPN)235668427 035 $a(EXLCZ)994100000007823590 100 $a20190402d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrinciples of Security and Trust$b[electronic resource] $e8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6?11, 2019, Proceedings /$fedited by Flemming Nielson, David Sands 205 $a1st ed. 2019. 210 $cSpringer Nature$d2019 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 249 p. 2896 illus., 22 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11426 311 $a3-030-17137-X 327 $aFoundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of ?-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts. 330 $aThis book is Open Access under a CC BY licence. 410 0$aSecurity and Cryptology ;$v11426 606 $aComputer security 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aComputer system failures 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 610 $aComputer science 610 $aComputer security 610 $aSoftware engineering 610 $aArtificial intelligence 610 $aComputer system failures 610 $aComputers 615 0$aComputer security. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aComputer system failures. 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aArtificial Intelligence. 615 24$aSystem Performance and Evaluation. 615 24$aComputing Milieux. 615 24$aTheory of Computation. 676 $a005.8 700 $aNielson$b Flemming$4edt$0714740 702 $aNielson$b Flemming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSands$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466304203316 996 $aPrinciples of Security and Trust$93358691 997 $aUNISA