Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
113
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,886
similar
All similar
Record
: found
Abstract
: found
Book
: found
Is Open Access
Principles of Security and Trust
other
Editor(s):
Lujo Bauer
,
Ralf Küsters
Publication date
(Print):
2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Download
Download
PDF
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The FAIR data principles
Author and book information
Book
ISBN (Print):
978-3-319-89721-9
ISBN (Electronic):
978-3-319-89722-6
Publication date (Print):
2018
DOI:
10.1007/978-3-319-89722-6
SO-VID:
89d66d2e-b464-4d39-96ca-8608882207fc
License:
http://creativecommons.org/licenses/by/4.0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
What’s the Over/Under? Probabilistic Bounds on Information Leakage
pp. 28
Secure Information Release in Timed Automata
pp. 53
Compositional Non-interference for Concurrent Programs via Separation and Framing
pp. 79
The Meaning of Memory Safety
pp. 109
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels
pp. 134
Leakage and Protocol Composition in a Game-Theoretic Perspective
pp. 160
Equivalence Properties by Typing in Cryptographic Branching Protocols
pp. 188
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience
pp. 217
SoK: Unraveling Bitcoin Smart Contracts
pp. 270
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
pp. 278
UniTraX: Protecting Data Privacy with Discoverable Biases
pp. 303
Transcompiling Firewalls
pp. 325
On Quantitative Analysis of Attack–Defense Trees with Repeated Labels
Similar content
2,886
Regaining Trust: Impact of Transparent User Interface Design on Acceptance of Camera-Based In-Car Health Monitoring Systems
Authors:
Hauke Sandhaus
,
Madiha Zahrah Choksi
,
Wendy Ju
Developing a formative scale to measure consumers’ trust toward interaction with artificially intelligent (AI) social robots in service delivery
Authors:
Oscar Hengxuan Chi
,
Shizhen Jia
,
Yafang Li
…
A qualitative exploration of trust in the contemporary workplace
Authors:
Sarah Fischer
,
Arlene Walker
See all similar
Cited by
1
Developing secure Bitcoin contracts with BitML
Authors:
Nicola Atzei
,
Massimo Bartoletti
,
Stefano Lande
…
See all cited by