Principles of Security and Trust [electronic resource] : 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings / edited by Flemming Nielson, David Sands.

Contributor(s): Nielson, Flemming [editor.] | Sands, David [editor.] | SpringerLink (Online service)
Material type: TextTextSeries: Security and Cryptology: 11426Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019Description: XI, 249 p. 2896 illus., 22 illus. in color. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783030171384Subject(s): Computer security | Software engineering | Artificial intelligence | Computer system failures | Computers | Systems and Data Security | Software Engineering/Programming and Operating Systems | Artificial Intelligence | System Performance and Evaluation | Computing Milieux | Theory of ComputationAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Foundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of Ʃ-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts.
In: Springer Nature Open Access eBookSummary: This book is Open Access under a CC BY licence.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Foundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of Ʃ-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts.

Open Access

This book is Open Access under a CC BY licence.

There are no comments on this title.

to post a comment.
Supported by Central Library, NIT Hamirpur
Powered by KOHA