![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
7th POST@ETAPS 2018: Thessaloniki, Greece
- Lujo Bauer, Ralf Küsters:
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings. Lecture Notes in Computer Science 10804, Springer 2018, ISBN 978-3-319-89721-9
Information Flow and Non-intereference
- Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks
, Stephen Magill:
What's the Over/Under? Probabilistic Bounds on Information Leakage. 3-27 - Panagiotis Vasilikos
, Flemming Nielson
, Hanne Riis Nielson
:
Secure Information Release in Timed Automata. 28-52 - Aleksandr Karbyshev
, Kasper Svendsen, Aslan Askarov, Lars Birkedal:
Compositional Non-interference for Concurrent Programs via Separation and Framing. 53-78 - Arthur Azevedo de Amorim, Catalin Hritcu, Benjamin C. Pierce:
The Meaning of Memory Safety. 79-105
Leakage, Information Flow, and Protocols
- Hamed Nemati
, Christoph Baumann, Roberto Guanciale
, Mads Dam:
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels. 109-133 - Mário S. Alvim
, Konstantinos Chatzikokolakis
, Yusuke Kawamoto
, Catuscia Palamidessi
:
Leakage and Protocol Composition in a Game-Theoretic Perspective. 134-159 - Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
Equivalence Properties by Typing in Cryptographic Branching Protocols. 160-187 - Giada Sciarretta
, Roberto Carbone
, Silvio Ranise
, Luca Viganò
:
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience. 188-213
Smart Contracts and Privacy
- Nicola Atzei
, Massimo Bartoletti
, Tiziana Cimoli
, Stefano Lande
, Roberto Zunino
:
SoK: Unraveling Bitcoin Smart Contracts. 217-242 - Ilya Grishchenko
, Matteo Maffei, Clara Schneidewind:
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts. 243-269 - Anastasia Mavridou, Aron Laszka
:
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. 270-277 - Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg:
UniTraX: Protecting Data Privacy with Discoverable Biases. 278-299
Firewalls and Attack-Defense Trees
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi
, Letterio Galletta
, Mauro Tempesta:
Transcompiling Firewalls. 303-324 - Barbara Kordy, Wojciech Widel
:
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. 325-346
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.