• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Principles of security and trust :

پدید آورنده
Lujo Bauer, Ralf Küsters (eds.).

موضوع
Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer science.,Computer security.,Computer security.,Computers-- Computer Science.,Computers-- Hardware-- Handheld Devices.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Systems analysis & design.

رده
QA76
.
9
.
A25
P67
2018eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3319897225
(Number (ISBN
9783319897226
Erroneous ISBN
9783319897219

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Principles of security and trust :
General Material Designation
[Book]
Other Title Information
7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /
First Statement of Responsibility
Lujo Bauer, Ralf Küsters (eds.).

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer Open,
Date of Publication, Distribution, etc.
2018.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xiv, 347 pages) :
Other Physical Details
illustrations

SERIES

Series Title
Advanced research in computing and software science
Series Title
Lecture notes in computer science,
Series Title
LNCS sublibrary. SL 4, Security and cryptology
Volume Designation
10804
ISSN of Series
0302-9743 ;

GENERAL NOTES

Text of Note
International conference proceedings.

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
0

SUMMARY OR ABSTRACT

Text of Note
This book is Open Access under a CC BY licence.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783319897226

PARALLEL TITLE PROPER

Parallel Title
POST 2018

TOPICAL NAME USED AS SUBJECT

Computer security, Congresses.
Data encryption (Computer science), Congresses.
Algorithms & data structures.
Computer science.
Computer security.
Computer security.
Computers-- Computer Science.
Computers-- Hardware-- Handheld Devices.
Computers-- Information Theory.
Computers-- Security-- General.
Computers-- Social Aspects-- Human-Computer Interaction.
Data encryption (Computer science)
Information technology: general issues.
Systems analysis & design.

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
P67
2018eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Bauer, Lujo
Küsters, Ralf

CORPORATE BODY NAME - PRIMARY RESPONSIBILITY

POST (Conference)(7th :2018 :, Thessalonikē, Greece)

CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY

ETAPS (Conference)(21st :2018 :, Thessalonikē , Greece)

ORIGINATING SOURCE

Date of Transaction
20200823114726.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival