Buch, Englisch, 365 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5737 g
Reihe: Security and Cryptology
4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings
Buch, Englisch, 365 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5737 g
Reihe: Security and Cryptology
ISBN: 978-3-662-46665-0
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges.- IFC Inside: Retrofitting Languages with Dynamic Information Flow Control.- Very Static Enforcement of Dynamic Policies.- The Foundational Cryptography Framework.- On the Flow of Data, Information, and Time.- Pareto Efficient Solutions of Attack-Defence Trees.- Analysis of XACML Policies with SMT.- Automatically Checking Commitment Protocols in ProVerif without False Attacks.- Generalizing Multi-party Contract Signing.- Leakiness is Decidable for Well-Founded Protocols.- Abstractions for Security Protocol Verification.- Automated Backward Analysis of PKCS#11 v2.20.- A Safe Update Mechanism for Smart Cards.- Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols.- Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques.- Type-Based Verification of Electronic Voting Protocols.- Composing Security Protocols: From Confidentiality to Privacy.- PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law.