|
Showing 1 - 2 of
2 matches in All Departments
|
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
|
R2,517
Discovery Miles 25 170
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Third
International Conference on Principles of Security and Trust, POST
2014, held as part of the European Joint Conferences on Theory and
Practice of Software, ETAPS 2014, Grenoble, France, in April 2014.
The 15 papers presented in this volume were carefully reviewed and
selected from 55 submissions. They are organized in topical
sections named: analysis of cryptographic protocols; quantitative
aspects of information flow; information flow control in
programming languages; cryptography in implementations and policies
and attacks.
Security protocols are distributed programs that are aimed at
securing communications by the means of cryptography. They are for
instance used to secure electronic payments, home banking, and more
recently electronic elections. Given the financial and societal
impact in case of failure and the long history of design flaws in
such protocols, formal verification is a necessity. A major
difference from other safety critical systems is that the
properties of security protocols must hold in the presence of an
arbitrary adversary. Formal Models and Techniques for Analyzing
Security Protocols provides the reader with a tutorial on some
modern techniques to model and automatically analyze security
protocols. Given the large body of work in this area, it does not
aim to be exhaustive so the focus is on some selected methods and
results. The tutorial can be used as a basis for a master or
graduate course on the topic, or as a primer for researchers from
different areas to get an overview of the kinds of techniques that
are available.
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.