FEEDBACK Smiley face
Normal view MARC view ISBD view

Principles of Security and Trust [electronic resource] :8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings /

Contributor(s): Nielson, Flemming [editor.] | Sands, David [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 11426Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XI, 249 p. 2896 illus., 22 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030171384.Subject(s): Computer Science | Computer security | Software engineering | Artificial intelligence | Computer system performance | Computer science | Information theory | Systems and Data Security | Software Engineering/Programming and Operating Systems | Artificial Intelligence | System Performance and Evaluation | Computing Milieux | Theory of ComputationOnline resources: Click here to access online
Contents:
Foundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of Ʃ-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts.
In: Springer eBooksSummary: This book is Open Access under a CC BY licence.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Foundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of Ʃ-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts.

Open Access

This book is Open Access under a CC BY licence.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in