TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
access control | |
adversarial contexts | |
adversarial robustness | |
attacker advantage | |
authenticated encryption | |
authentication | |
Automated proofs | |
availability | |
B | |
back-translation | |
bisimilarity | |
Block cipher modes | |
blockchain | |
C | |
capabilities | |
capability machines | |
Checked C | |
collusion-free protocols | |
collusion-preserving protocols | |
Compiler | |
Completeness | |
Computational Security | |
computer-aided cryptography | |
consensus | |
Coq | |
covert channels | |
cryptography | |
D | |
d-privacy | |
DDoS attacks | |
decidability | |
differential privacy | |
Digital ICs | |
distance bounding | |
distant attacker | |
DP-3T | |
dynamic release | |
E | |
E-voting | |
EKE | |
electronic voting | |
equational theories | |
Ethereum 2.0 | |
F | |
fair exchange | |
formal methods | |
formal methods and verification | |
formal verification | |
full-system guarantees | |
G | |
GDPR enforcement | |
H | |
hardware tokens | |
Hyperliveness | |
HyperLTL | |
Hyperproperties | |
I | |
Indistinguishability | |
information flow | |
information flow control | |
Information-flow security | |
Interactive Theorem Proving | |
K | |
key agreement | |
key exchange | |
key hierarchy | |
L | |
language-based mechanisms | |
language-based security | |
Legendre PRF | |
Linicrypt | |
Linkability | |
Logic | |
Logic Locking | |
logical relations | |
M | |
machine learning | |
mechanized proofs | |
membership inference | |
memory sharing | |
metric differential privacy | |
multiparty computation | |
multiset rewriting | |
N | |
network security | |
non-interactive key exchange | |
noninterference | |
O | |
observational equivalence | |
off-line guessing | |
P | |
PAKE | |
partial programs | |
path-aware Internet architectures | |
preprocessing | |
Privacy | |
privacy-utility trade-off | |
Probabilistic model checking | |
probabilistic process equivalences | |
Probabilistic programs | |
proof techniques | |
Prophecy Variables | |
protocol analysis | |
Protocol security | |
protocols | |
Q | |
quantum information | |
R | |
Refinement | |
replay attacks | |
replication | |
robust safety | |
runtime checking | |
S | |
secure bandwidth allocation | |
secure compilation | |
security | |
security protocols | |
Selene | |
SELinux | |
semantics | |
simulation | |
Spatial Memory Safety | |
static analysis | |
stochastic systems | |
symbolic verification | |
Symmetric key cryptography | |
Synthesis | |
T | |
tagged architectures | |
Transition system | |
U | |
unforgeable pointers | |
universal contracts | |
universal optimality | |
unlinkability | |
V | |
vehicular platooning | |
Verification | |
W | |
while programs |