LEADER 03670nam 2200613Ia 450 001 9910484890203321 005 20200520144314.0 010 $a3-642-02002-X 024 7 $a10.1007/978-3-642-02002-5 035 $a(CKB)1000000000746046 035 $a(SSID)ssj0000317734 035 $a(PQKBManifestationID)11246704 035 $a(PQKBTitleCode)TC0000317734 035 $a(PQKBWorkID)10293133 035 $a(PQKB)11660542 035 $a(DE-He213)978-3-642-02002-5 035 $a(MiAaPQ)EBC3064196 035 $a(PPN)136301223 035 $a(EXLCZ)991000000000746046 100 $a20090713d2009 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFormal to practical security $epapers issued from the 2005-2008 French Japanese collaboration /$fVeronique Cortier ... [et al.] (ed.) 205 $a1st ed. 2009. 210 $aBerlin $cSpringer-Verlag$dc2009 215 $a1 online resource (VII, 199 p.) 225 1 $aLecture notes in computer science ;$v5458 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-02001-1 320 $aIncludes bibliographical references and index. 327 $aFormal to Practical Security -- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables -- Validating Integrity for the Ephemerizer?s Protocol with CL-Atse -- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols -- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin -- Comparing State Spaces in Automatic Security Protocol Analysis -- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures -- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment -- New Anonymity Notions for Identity-Based Encryption -- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption -- Writing an OS Kernel in a Strictly and Statically Typed Language. 330 $aThis State-of-the-Art Survey contains a collection of papers originating in the French-Japanese Collaboration on Formal to Practical Security that have crystallized around workshops held in Tokyo and Nancy between 2005 and 2008. These publications mirror the importance of the collaborations in the various fields of computer science to solve these problems linked with other sciences and techniques as well as the importance of bridging the formal theory and practical applications. The 10 papers presented address issues set by the global digitization of our society and its impact on social organization like privacy, economics, environmental policies, national sovereignty, as well as medical environments. The contents cover various aspects of security, cryptography, protocols, biometry and static analysis. This book is aimed at researchers interested in new results but it also serves as an entry point for readers interested in this domain. 410 0$aLecture notes in computer science ;$v5458. 606 $aComputer security$vCongresses 606 $aComputers$xAccess control$vCongresses 606 $aData protection$vCongresses 615 0$aComputer security 615 0$aComputers$xAccess control 615 0$aData protection 676 $a004 686 $aDAT 460f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aCortier$b Veronique$0606143 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484890203321 996 $aFormal to practical security$94198210 997 $aUNINA