Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/786
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBauer, Lujo. ;en_US
dc.contributor.authorKesters, Ralf. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:06Z-
dc.date.available2020-05-17T08:22:06Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319897226 ;en_US
dc.identifier.isbn9783319897219 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/786-
dc.description005.8 ; 23 ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319897219. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book is Open Access under a CC BY licence. ;en_US
dc.description.statementofresponsibilityedited by Lujo Bauer, Ralf Kesters.en_US
dc.description.tableofcontentsInformation Flow and Non-Intereference -- What's the Over/Undere Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ;en_US
dc.format.extentXIV, 347 p. 85 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ;en_US
dc.relation.haspart9783319897226.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer system failures. ;en_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputersen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectTheory of Computation. ;en_US
dc.subjectComputing Milieux. ;en_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystem Performance and Evaluation. ;en_US
dc.titlePrinciples of Security and Trusten_US
dc.title.alternative7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319897226.pdf12.87 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBauer, Lujo. ;en_US
dc.contributor.authorKesters, Ralf. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:06Z-
dc.date.available2020-05-17T08:22:06Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319897226 ;en_US
dc.identifier.isbn9783319897219 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/786-
dc.description005.8 ; 23 ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319897219. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book is Open Access under a CC BY licence. ;en_US
dc.description.statementofresponsibilityedited by Lujo Bauer, Ralf Kesters.en_US
dc.description.tableofcontentsInformation Flow and Non-Intereference -- What's the Over/Undere Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ;en_US
dc.format.extentXIV, 347 p. 85 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ;en_US
dc.relation.haspart9783319897226.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer system failures. ;en_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputersen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectTheory of Computation. ;en_US
dc.subjectComputing Milieux. ;en_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystem Performance and Evaluation. ;en_US
dc.titlePrinciples of Security and Trusten_US
dc.title.alternative7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319897226.pdf12.87 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBauer, Lujo. ;en_US
dc.contributor.authorKesters, Ralf. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:06Z-
dc.date.available2020-05-17T08:22:06Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319897226 ;en_US
dc.identifier.isbn9783319897219 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/786-
dc.description005.8 ; 23 ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319897219. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book is Open Access under a CC BY licence. ;en_US
dc.description.statementofresponsibilityedited by Lujo Bauer, Ralf Kesters.en_US
dc.description.tableofcontentsInformation Flow and Non-Intereference -- What's the Over/Undere Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. ;en_US
dc.format.extentXIV, 347 p. 85 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10804. ;en_US
dc.relation.haspart9783319897226.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer system failures. ;en_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputersen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectTheory of Computation. ;en_US
dc.subjectComputing Milieux. ;en_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectSystem Performance and Evaluation. ;en_US
dc.titlePrinciples of Security and Trusten_US
dc.title.alternative7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319897226.pdf12.87 MBAdobe PDFThumbnail
Preview File