Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/786
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bauer, Lujo. ; | en_US |
dc.contributor.author | Kesters, Ralf. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:06Z | - |
dc.date.available | 2020-05-17T08:22:06Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319897226 ; | en_US |
dc.identifier.isbn | 9783319897219 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/786 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319897219. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book is Open Access under a CC BY licence. ; | en_US |
dc.description.statementofresponsibility | edited by Lujo Bauer, Ralf Kesters. | en_US |
dc.description.tableofcontents | Information Flow and Non-Intereference -- What's the Over/Undere Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ; | en_US |
dc.format.extent | XIV, 347 p. 85 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ; | en_US |
dc.relation.haspart | 9783319897226.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer system failures. ; | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Theory of Computation. ; | en_US |
dc.subject | Computing Milieux. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | System Performance and Evaluation. ; | en_US |
dc.title | Principles of Security and Trust | en_US |
dc.title.alternative | 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319897226.pdf | 12.87 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bauer, Lujo. ; | en_US |
dc.contributor.author | Kesters, Ralf. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:06Z | - |
dc.date.available | 2020-05-17T08:22:06Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319897226 ; | en_US |
dc.identifier.isbn | 9783319897219 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/786 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319897219. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book is Open Access under a CC BY licence. ; | en_US |
dc.description.statementofresponsibility | edited by Lujo Bauer, Ralf Kesters. | en_US |
dc.description.tableofcontents | Information Flow and Non-Intereference -- What's the Over/Undere Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ; | en_US |
dc.format.extent | XIV, 347 p. 85 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ; | en_US |
dc.relation.haspart | 9783319897226.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer system failures. ; | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Theory of Computation. ; | en_US |
dc.subject | Computing Milieux. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | System Performance and Evaluation. ; | en_US |
dc.title | Principles of Security and Trust | en_US |
dc.title.alternative | 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319897226.pdf | 12.87 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bauer, Lujo. ; | en_US |
dc.contributor.author | Kesters, Ralf. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:06Z | - |
dc.date.available | 2020-05-17T08:22:06Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319897226 ; | en_US |
dc.identifier.isbn | 9783319897219 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/786 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319897219. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book is Open Access under a CC BY licence. ; | en_US |
dc.description.statementofresponsibility | edited by Lujo Bauer, Ralf Kesters. | en_US |
dc.description.tableofcontents | Information Flow and Non-Intereference -- What's the Over/Undere Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ; | en_US |
dc.format.extent | XIV, 347 p. 85 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ; | en_US |
dc.relation.haspart | 9783319897226.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer system failures. ; | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Theory of Computation. ; | en_US |
dc.subject | Computing Milieux. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | System Performance and Evaluation. ; | en_US |
dc.title | Principles of Security and Trust | en_US |
dc.title.alternative | 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319897226.pdf | 12.87 MB | Adobe PDF | Preview File |