FLOC 2018: FEDERATED LOGIC CONFERENCE 2018
CSF CSF PROCEEDINGS: KEYWORD INDEX
A
Abstract Interpretation
algorithm substitution attacks
Attack Trees
attacker knowledge
Authentication
automated reasoning
Automated verification
B
backdoors
Belenios
bounds on leakage
broadcast communication
C
causality preservation
composition
computational model
computational soundness
computer aided security proofs
computer-aided cryptography
Confidentiality
cryptographic constant-time
cryptographic schemes
D
declassification
Domain-specific languages
E
e-voting
EasyCrypt
Ethereum
F
Formal Analysis
Formal Methods
formal methods for security
formal proof
formal proofs
formal verification
G
garbled circuit
global states
greatest fixed point
H
hash functions
HKDF
HMAC
I
immunization
Inductive invariants
inference attacks
information flow
Information flow control
integrity
K
kleptography
knowledge-based noninterference
L
language based security
Log analysis
M
MAC
Machine Learning
Modeling and Specification
modelling secure protocols
Multi Factor
Multi-agent workflows
Multi-party computation
N
Non-interference
O
operational semantics
P
permission model
Privacy
proactive security
propositional logic
Protocol Verification
Q
quantitative information flow
R
random sample voting
reactive programs
relative soundness results
robust declassification
runtime verification
S
secure channels
Secure compilation
Secure multiparty computation
Security
security definitions
security protocols
Semantic model
semantics
side-channels
Smart Contract Verification
stateful protocols
symbolic constraints
symbolic cryptography
symbolic sampling
symbolic security
System-based design
T
TLS
Trace semantics
Translation
type system
type systems
typing results
V
verifiable electronic voting
Verification