Principles of Security and Trust
40,99
versandkostenfrei*

Preis in Euro, inkl. MwSt.
Sofort lieferbar
20 °P sammeln

    Broschiertes Buch

This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems.…mehr

Produktbeschreibung
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems.
  • Produktdetails
  • Lecture Notes in Computer Science .11426
  • Verlag: Springer, Berlin; Springer International Publishing
  • Artikelnr. des Verlages: .978-3-030-17137-7, 978-3-030-17137-7
  • 1st ed. 2019
  • Erscheinungstermin: 3. April 2019
  • Englisch
  • Abmessung: 233mm x 154mm x 22mm
  • Gewicht: 406g
  • ISBN-13: 9783030171377
  • ISBN-10: 303017137X
  • Artikelnr.: 55400202
Inhaltsangabe
Foundations for parallel information ow control runtime systems.- A Formal Analysis of Timing Channel Security via Bucketing.- A Dependently Typed Library for Static Information-Flow Control in Idris.- Achieving Safety Incrementally with Checked C.- Wys : A DSL for Verified Secure Multi-party Computations.- Generalised Differential Privacy for Text Document Processing.- Symbolic verification of distance bounding protocols.- On the formalisation of -Protocols and Commitment Schemes.- Orchestrating Layered Attestations.- Verifying liquidity of Bitcoin contracts.