0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,359 Discovery Miles 23 590 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback): Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback)
Veronique Cortier, Steve Kremer
R2,019 Discovery Miles 20 190 Ships in 10 - 15 working days

Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial and societal impact in case of failure and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. Formal Models and Techniques for Analyzing Security Protocols provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. Given the large body of work in this area, it does not aim to be exhaustive so the focus is on some selected methods and results. The tutorial can be used as a basis for a master or graduate course on the topic, or as a primer for researchers from different areas to get an overview of the kinds of techniques that are available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Poltek 1/100 Poultry Infra Red Lamp…
R320 Discovery Miles 3 200
Wireless Automatic Vibrating Realistic…
R999 R499 Discovery Miles 4 990
Tenet
John David Washington, Robert Pattinson Blu-ray disc  (1)
R52 R44 Discovery Miles 440
Wagworld Pet Blankie (Blue) - X Large…
R309 R129 Discovery Miles 1 290
Conforming Bandage
R4 Discovery Miles 40
Fear the Walking Dead: The Complete…
Blu-ray disc R130 Discovery Miles 1 300
Rotatrim A3 80gsm White Paper (1 Ream)
R184 Discovery Miles 1 840
Sharp EL-W506T Scientific Calculator…
R599 R560 Discovery Miles 5 600
King Of Sloth - Kings Of Sin: Book 4
Ana Huang Paperback R280 R140 Discovery Miles 1 400
Canon 445 Black Original Ink Cartridge…
R700 R350 Discovery Miles 3 500

 

Partners