top of page

Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

Inside this Book

If you make use of this material, you may credit the authors as follows:

Bauer Lujo and Küsters Ralf (Editors), "Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings", Springer Nature, 2018, DOI: 10.1007/978-3-319-89722-6, License: https://creativecommons.org/licenses/by/4.0/

authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic; software engineering; specifications; verification; world wide web

Keywords

Authentication, Computer Science, Computer Software Selection And Evaluation, Cryptography, Data Privacy, Formal Logic, Formal Methods, Formal Specification, Internet, Privacy, Program Compilers, Programming Languages, Security Analysis, Security Systems, Semantics, Separation Logic, Software Engineering, Specifications, Verification, World Wide Web

Rights | License

Except where otherwise noted, this item has been published under the following license:

Takedown policy

If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.

bottom of page