Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / [electronic resource] : edited by Lujo Bauer, Ralf Küsters. - 1st ed. 2018. - XIV, 347 p. 85 illus. online resource. - Security and Cryptology ; 10804 . - Security and Cryptology ; 10804 .

Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.

Open Access

This book is Open Access under a CC BY licence.

9783319897226

10.1007/978-3-319-89722-6 doi


Computer security.
Computers.
Data structures (Computer science).
Computer system failures.
Systems and Data Security.
Theory of Computation.
Computing Milieux.
Data Structures and Information Theory.
System Performance and Evaluation.

QA76.9.A25

005.8
Supported by Central Library, NIT Hamirpur
Powered by KOHA