0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,829 Discovery Miles 18 290 Ships in 10 - 15 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised... Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Peng Liu, Sjouke Mauw, Ketil Stolen
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017. The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security.

Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings... Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings (Paperback, 2014 ed.)
Sjouke Mauw, Christian Damsgaard Jensen
R2,048 Discovery Miles 20 480 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008,... Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings (Paperback, 2008 ed.)
Stig F. Mjolsnes, Sjouke Mauw, Sokratis Katsikas
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

This book contains the proceedings of the 5th European Public Key Infrastr- ture Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gloshaugen in Trondheim, Norway, in June 2008. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Simplyput, publickeysareeasiertodistributethansecretkeys.Nevertheless, constructing e?ective, practical, secure and low cost means for assuring auth- ticity and validity of public keys used in large-scale networked services remains both a technological and organizational challenge. In a nutshell, this is the PKI problem, and the papers presented herein propose new solutions and insight for these questions. This volume holds 16 refereedpapers including the presentationpaper by the invited speaker P. Landrock. In response to the EuroPKI 2008 call for papers, a total of 37 paper proposalswere received. All submissions underwenta thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries: Belgium, Brazil, Canada, Finland, Germany, Japan, Malaysia, Norway, Spain, and the USA.Theacceptedpaperswereorganizedintothe topicalsessions: InvitedTalk, Certi?cates, Authentication, Practice, Signatures, Analysis, and Networks.

CONCUR'99. Concurrency Theory - 10th International Conference Eindhoven, The Netherlands, August 24-27, 1999 Proceedings... CONCUR'99. Concurrency Theory - 10th International Conference Eindhoven, The Netherlands, August 24-27, 1999 Proceedings (Paperback, 1999 ed.)
Jos C.M. Baeten, Sjouke Mauw
R3,057 Discovery Miles 30 570 Ships in 10 - 15 working days

This volume contains the proceedings of the 10th International Conference on Concurrency Theory (CONCUR'99) held in Eindhoven, The Netherlands, 24-27 August 1999. ThepurposeoftheCONCURconferencesistobringtogetherresearchers, - velopersandstudentsinordertoadvancethetheoryofconcurrencyandpromote its applications. Interest in this topic is continuously growing, as a consequence oftheimportanceandubiquityofconcurrentsystemsandtheirapplications, and of the scienti?c relevance of their foundations. The scope of CONCUR'99 covers all areas of semantics, logics and veri?cation techniques for concurrent systems. A list of speci?c topics includes (but is not limited to) concurrency-related - pects of: models of computation and semantic domains, process algebras, Petri nets, event structures, real-time systems, hybrid systems, stochastic systems, - cidability, model-checking, veri?cation techniques, re?nement techniques, term and graph rewriting, distributed programming, logic constraint programming, object-oriented programming, typing systems and algorithms, case studies, and tools and environments for programming and veri?cation. The ?rst two CONCUR conferences were held in Amsterdam (NL) in 1990 and 1991, the following ones in Stony Brook (USA), Hildesheim (D), Uppsala (S), Philadelphia (USA), Pisa (I), Warsaw (PL) and Nice (F). The proceedings have appeared in Springer LNCS, as Volumes 458, 527, 630, 715, 836, 962, 1119, 1243, and 1466.

Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019,... Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Sjouke Mauw, Mauro Conti
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected... Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Sjouke Mauw, Barbara Kordy, Sushil Jajodia
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bloed, Dunner as Water - Suid-Afrika se…
Charne Kemp Paperback R340 R292 Discovery Miles 2 920
She Is Safe - An Exposé Of The Dark…
Emma van der Walt Paperback R280 R241 Discovery Miles 2 410
See What You Made Me Do - Power, Control…
Jess Hill Hardcover R736 Discovery Miles 7 360
Khwezi - The Remarkable Story Of…
Redi Tlhabi Paperback  (7)
R637 Discovery Miles 6 370
Subverting Hatred - The Challenge of…
Daniel L. Smith-Christopher Paperback R709 R586 Discovery Miles 5 860
Op Die Duiwel Se Spoor - Hoe Ek Die…
Ben "Bliksem" Booysen Paperback  (1)
R320 R275 Discovery Miles 2 750
I'm The Girl Who Was Raped
Michelle Hattingh Paperback R532 Discovery Miles 5 320
Fuelling Futures
Tshepiso Phosa, Timothy Maurice Paperback R199 R156 Discovery Miles 1 560
Wounded Heart Workbook, The
Dan B Allender Paperback  (1)
R392 R320 Discovery Miles 3 200
Redemption from Within - Adjusting the…
Ifeanyichukwu Uko Uko Hardcover R669 Discovery Miles 6 690

 

Partners