VSL 2014: VIENNA SUMMER OF LOGIC 2014
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
abstract interpretation
access control
Accountable escrow
Accountable-escrowed encryption
adversary models
Algebraic Message Model
Anonymity Guarantees
Anonymous Communication Protocols
Attack trees
attribute-based encryption
authentication
B
Batch verification
Bilinear Pairing
block-ciphers
C
capabilities
channel capacity
Cognitive Science
compositionality
Computer-Aided Cryptography
Consequences
contracts
Coq
cryptographic definitions
Cryptographic protocol analysis
cyber-insurance
D
Decidability results
declassification
delegatable anonymous credentials
Differential Privacy
Diffie-Hellman
Diffie-Hellman key exchange
digital forensics
Distributed Algorithm
E
economics of security
Efficient protocols
Epsilon
Escrowed public key
Event-B
execution monitoring
Execution monitors
Experiment
F
Firewall
Floating-label systems
Flow-sensitive references
formal methods
Formal verification
G
generalised entropy measurements
H
Haskell
Hoare logic
Human Behavior
I
information flow
information flow control
Information Flow Security
interactive systems
K
Key Compromise Impersonation
L
LIO
M
malleable signatures
Memory Safety
Message Formats
modeling
modes of operation
N
Need for Cognition
Network security
networks
non-interference
non-standard analysis
P
Privacy
privacy foundation
Process Calculi
Product Programs
protocol analysis
Protocol Suite
Public key crypto
Q
quantitative information flow
Quantitative security
R
reactive systems
relational logic
Rewriting system
Risk Awareness
risk mitigation
Risk Propensity
S
Satisfiability Modulo Theories
scale-free networks
secrecy
secret-sharing
Secure Electronic Voting
secure multi-execution
Secure multiparty computation
Secure Web Bulletin Board
Security
Security models
security properties
security protocols
Security Type Systems
Session integrity
Software Fault Isolation
Sound Abstraction
SSH
Static Analysis
strand spaces
Surveillance
Symbolic model
symmetric encryption
synthesis
T
Technology Adoption
theorem proving
Timing Attacks
Timing of Security Decisions
TLS
topology
Tor
U
Unification
Universal composability
Usable Security
V
verification
Verified Software
W
Weak Memory Models
Web authentication
web scripts
Website Fingerprinting
Z
zero-knowledge proofs