TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
Abstract Interpretation | |
algorithm substitution attacks | |
attack trees | |
attacker knowledge | |
Authentication | |
automated reasoning | |
Automated verification | |
B | |
backdoors | |
Belenios | |
bounds on leakage | |
broadcast communication | |
C | |
causality preservation | |
composition | |
computational model | |
computational soundness | |
computer aided security proofs | |
computer-aided cryptography | |
Confidentiality | |
cryptographic constant-time | |
cryptographic schemes | |
D | |
declassification | |
Domain-specific languages | |
E | |
e-voting | |
EasyCrypt | |
Ethereum | |
F | |
Formal Analysis | |
Formal Methods | |
formal methods for security | |
formal proof | |
formal proofs | |
formal verification | |
G | |
garbled circuit | |
global states | |
greatest fixed point | |
H | |
hash functions | |
HKDF | |
HMAC | |
I | |
immunization | |
Inductive Invariants | |
inference attacks | |
information flow | |
Information flow control | |
integrity | |
K | |
kleptography | |
knowledge-based noninterference | |
L | |
language based security | |
Log analysis | |
M | |
MAC | |
Machine Learning | |
Modeling and Specification | |
modelling secure protocols | |
Multi Factor | |
Multi-agent workflows | |
Multi-party computation | |
N | |
Non-interference | |
O | |
operational semantics | |
P | |
permission model | |
Privacy | |
proactive security | |
propositional logic | |
Protocol Verification | |
Q | |
quantitative information flow | |
R | |
random sample voting | |
reactive programs | |
relative soundness results | |
robust declassification | |
Runtime Verification | |
S | |
secure channels | |
Secure compilation | |
Secure multiparty computation | |
Security | |
security definitions | |
security protocols | |
Semantic model | |
semantics | |
side-channels | |
Smart Contract Verification | |
stateful protocols | |
symbolic constraints | |
symbolic cryptography | |
symbolic sampling | |
symbolic security | |
System-based design | |
T | |
TLS | |
Trace semantics | |
Translation | |
type system | |
type systems | |
typing results | |
V | |
verifiable electronic voting | |
Verification |