TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| Accountability | |
| applicative bisimulation | |
| Audit | |
| automated verification | |
| automation | |
| C | |
| Causality | |
| causation | |
| coinduction | |
| computational indistinguishability | |
| computational semantics | |
| computational soundness | |
| Continuous Time | |
| cryptographic protocols | |
| cyber-physical security protocols | |
| D | |
| decidability | |
| Dynamic information flow control | |
| dynamic security enforcement mechanisms | |
| E | |
| equivalence properties | |
| F | |
| first order logic | |
| Formal verification | |
| G | |
| gain function | |
| I | |
| implicit computational complexity | |
| L | |
| low-level code | |
| M | |
| metadata | |
| modal logic | |
| Multiset Rewriting | |
| mutable state | |
| P | |
| Permissive-upgrade | |
| policy composition | |
| probabilistic models | |
| program logics | |
| Protocol Security | |
| Q | |
| quantitative information flow | |
| R | |
| refinement | |
| S | |
| Security | |
| Security lattice | |
| security protocols | |
| Short Paper | |
| strand spaces | |
| structured code generators | |
| T | |
| tagged hardware | |
| theorem proving | |
| Tool | |
| V | |
| vulnerability | |