Title :
Table of contents
Abstract :
The following topics are dealt with: software security; information flow; usable security; cryptography; protocol verification; network security; and data privacy.
Keywords :
computer networks; data privacy; protocols; security of data; cryptography; data privacy; information flow; network security; protocol verification; software security; usable security;
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2014 IEEE 27th
Conference_Location :
Vienna