By accessing or using this site you accept and agree to our Terms and Conditions | As an Amazon Associate, we earn from qualifying purchases
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
Inside this Book



If you make use of this material, you may credit the authors as follows:
Bauer Lujo and Küsters Ralf (Editors), "Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings", Springer Nature, 2018, DOI: 10.1007/978-3-319-89722-6, License: https://creativecommons.org/licenses/by/4.0/
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic; software engineering; specifications; verification; world wide web
Keywords
Authentication, Computer Science, Computer Software Selection And Evaluation, Cryptography, Data Privacy, Formal Logic, Formal Methods, Formal Specification, Internet, Privacy, Program Compilers, Programming Languages, Security Analysis, Security Systems, Semantics, Separation Logic, Software Engineering, Specifications, Verification, World Wide Web
Rights | License
Except where otherwise noted, this item has been published under the following license:
Takedown policy
If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.