top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters
Autore Ralf Küsters
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Springer Nature, 2018
Descrizione fisica 1 online resource (XIV, 347 p. 85 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Data structures (Computer science)
Computer system failures
Systems and Data Security
Theory of Computation
Computing Milieux
Data Structures and Information Theory
System Performance and Evaluation
Soggetto non controllato security analysis
cryptography
privacy
world wide web
semantics
programming languages
formal specification
program compilers
specifications
formal logic
computer science
separation logic
formal methods
data privacy
security systems
software engineering
computer software selection and evaluation
internet
verification
authentication
ISBN 3-319-89722-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Record Nr. UNINA-9910293140103321
Ralf Küsters  
Springer Nature, 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters
Autore Ralf Küsters
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Springer Nature, 2018
Descrizione fisica 1 online resource (XIV, 347 p. 85 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Data structures (Computer science)
Computer system failures
Systems and Data Security
Theory of Computation
Computing Milieux
Data Structures and Information Theory
System Performance and Evaluation
Soggetto non controllato security analysis
cryptography
privacy
world wide web
semantics
programming languages
formal specification
program compilers
specifications
formal logic
computer science
separation logic
formal methods
data privacy
security systems
software engineering
computer software selection and evaluation
internet
verification
authentication
ISBN 3-319-89722-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Record Nr. UNISA-996465583103316
Ralf Küsters  
Springer Nature, 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui