7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
Lujo Bauer, Ralf Küsters (eds.).
Cham, Switzerland :
Springer Open,
2018.
1 online resource (xiv, 347 pages) :
illustrations
Advanced research in computing and software science
Lecture notes in computer science,
LNCS sublibrary. SL 4, Security and cryptology
10804
0302-9743 ;
International conference proceedings.
Includes bibliographical references and index.
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
0
This book is Open Access under a CC BY licence.
Springer Nature
com.springer.onix.9783319897226
POST 2018
Computer security, Congresses.
Data encryption (Computer science), Congresses.
Algorithms & data structures.
Computer science.
Computer security.
Computer security.
Computers-- Computer Science.
Computers-- Hardware-- Handheld Devices.
Computers-- Information Theory.
Computers-- Security-- General.
Computers-- Social Aspects-- Human-Computer Interaction.
Data encryption (Computer science)
Information technology: general issues.
Systems analysis & design.
005
.
8
23
QA76
.
9
.
A25
P67
2018eb
Bauer, Lujo
Küsters, Ralf
POST (Conference)(7th :2018 :, Thessalonikē, Greece)