TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| abstract interpretation | |
| algorithm substitution attacks | |
| attack trees | |
| attacker knowledge | |
| Authentication | |
| automated reasoning | |
| Automated verification | |
| B | |
| backdoors | |
| Belenios | |
| bounds on leakage | |
| broadcast communication | |
| C | |
| causality preservation | |
| composition | |
| computational model | |
| computational soundness | |
| computer aided security proofs | |
| computer-aided cryptography | |
| Confidentiality | |
| cryptographic constant-time | |
| cryptographic schemes | |
| D | |
| declassification | |
| Domain-specific languages | |
| E | |
| e-voting | |
| EasyCrypt | |
| Ethereum | |
| F | |
| Formal Analysis | |
| Formal Methods | |
| formal methods for security | |
| Formal proof | |
| formal proofs | |
| formal verification | |
| G | |
| garbled circuit | |
| global states | |
| greatest fixed point | |
| H | |
| hash functions | |
| HKDF | |
| HMAC | |
| I | |
| immunization | |
| Inductive invariants | |
| inference attacks | |
| information flow | |
| Information flow control | |
| integrity | |
| K | |
| kleptography | |
| knowledge-based noninterference | |
| L | |
| language based security | |
| Log analysis | |
| M | |
| MAC | |
| Machine Learning | |
| Modeling and Specification | |
| modelling secure protocols | |
| Multi Factor | |
| Multi-agent workflows | |
| Multi-party computation | |
| N | |
| Non-interference | |
| O | |
| operational semantics | |
| P | |
| permission model | |
| Privacy | |
| proactive security | |
| propositional logic | |
| Protocol Verification | |
| Q | |
| quantitative information flow | |
| R | |
| random sample voting | |
| reactive programs | |
| relative soundness results | |
| robust declassification | |
| Runtime verification | |
| S | |
| secure channels | |
| Secure compilation | |
| Secure multiparty computation | |
| Security | |
| security definitions | |
| security protocols | |
| Semantic model | |
| semantics | |
| side-channels | |
| Smart Contract Verification | |
| stateful protocols | |
| symbolic constraints | |
| symbolic cryptography | |
| symbolic sampling | |
| symbolic security | |
| System-based design | |
| T | |
| TLS | |
| Trace semantics | |
| Translation | |
| type system | |
| type systems | |
| typing results | |
| V | |
| verifiable electronic voting | |
| Verification | |