0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,359 Discovery Miles 23 590 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback): Veronique Cortier, Steve Kremer Formal Models and Techniques for Analyzing Security Protocols - A Tutorial (Paperback)
Veronique Cortier, Steve Kremer
R2,019 Discovery Miles 20 190 Ships in 10 - 15 working days

Security protocols are distributed programs that are aimed at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking, and more recently electronic elections. Given the financial and societal impact in case of failure and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. Formal Models and Techniques for Analyzing Security Protocols provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. Given the large body of work in this area, it does not aim to be exhaustive so the focus is on some selected methods and results. The tutorial can be used as a basis for a master or graduate course on the topic, or as a primer for researchers from different areas to get an overview of the kinds of techniques that are available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mellerware Swiss - Plastic Floor Fan…
 (1)
R348 Discovery Miles 3 480
Batten Holder Nylon 50mm White Bulk (3…
R59 Discovery Miles 590
Beyond Diplomacy - My Life Of Remarkable…
Riaan Eksteen Paperback R473 Discovery Miles 4 730
Lucky Define - Plastic 3 Head…
R390 Discovery Miles 3 900
King Of Greed - Kings Of Sin: Book 3
Ana Huang Paperback R280 R140 Discovery Miles 1 400
3:16 - The Numbers Of Hope
Max Lucado Paperback R328 Discovery Miles 3 280
Pet Mall Pet Bed Rectangle Fur 100cm X…
R2,950 Discovery Miles 29 500
Genuine Leather Wallet With Clip Closure…
R299 R160 Discovery Miles 1 600
Nuovo All-In-One Car Seat (Black)
R3,599 R3,020 Discovery Miles 30 200
Frozen - Blu-Ray + DVD
Blu-ray disc R330 Discovery Miles 3 300

 

Partners