0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,419 Discovery Miles 24 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback): Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback)
Veronique Cortier, Steve Kremer
R2,071 Discovery Miles 20 710 Ships in 10 - 15 working days

Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial and societal impact in case of failure and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. Formal Models and Techniques for Analyzing Security Protocols provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. Given the large body of work in this area, it does not aim to be exhaustive so the focus is on some selected methods and results. The tutorial can be used as a basis for a master or graduate course on the topic, or as a primer for researchers from different areas to get an overview of the kinds of techniques that are available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Fleshlight Girls - Mia Malkova - Boss…
R2,099 R1,599 Discovery Miles 15 990
Angelcare Nappy Bin Refills
R165 R145 Discovery Miles 1 450
Treeline Tennis Balls (Pack of 3)
R59 R43 Discovery Miles 430
Space Blankets (Adult)
 (1)
R16 Discovery Miles 160
Double Sided Wallet
R91 Discovery Miles 910
Finding Dory
Ellen DeGeneres, Albert Brooks, … Blu-ray disc  (1)
R38 Discovery Miles 380
Huntlea Koletto - Matlow Pet Bed…
R969 R562 Discovery Miles 5 620
Aeno Table Blender - Soupmaker TB1…
R2,299 Discovery Miles 22 990
Nintendo Joy-Con Neon Controller Pair…
 (1)
R1,899 R1,729 Discovery Miles 17 290

 

Partners