7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
First Statement of Responsibility
Lujo Bauer, Ralf Küsters (eds.).
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer Open,
Date of Publication, Distribution, etc.
2018.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource (xiv, 347 pages) :
Other Physical Details
illustrations
SERIES
Series Title
Advanced research in computing and software science
Series Title
Lecture notes in computer science,
Series Title
LNCS sublibrary. SL 4, Security and cryptology
Volume Designation
10804
ISSN of Series
0302-9743 ;
GENERAL NOTES
Text of Note
International conference proceedings.
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
0
SUMMARY OR ABSTRACT
Text of Note
This book is Open Access under a CC BY licence.
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783319897226
PARALLEL TITLE PROPER
Parallel Title
POST 2018
TOPICAL NAME USED AS SUBJECT
Computer security, Congresses.
Data encryption (Computer science), Congresses.
Algorithms & data structures.
Computer science.
Computer security.
Computer security.
Computers-- Computer Science.
Computers-- Hardware-- Handheld Devices.
Computers-- Information Theory.
Computers-- Security-- General.
Computers-- Social Aspects-- Human-Computer Interaction.
Data encryption (Computer science)
Information technology: general issues.
Systems analysis & design.
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8
Edition
23
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA76
.
9
.
A25
Book number
P67
2018eb
PERSONAL NAME - ALTERNATIVE RESPONSIBILITY
Bauer, Lujo
Küsters, Ralf
CORPORATE BODY NAME - PRIMARY RESPONSIBILITY
POST (Conference)(7th :2018 :, Thessalonikē, Greece)