LEADER 03508nam 22007335 450 001 9910254987503321 005 20251226203045.0 010 $a981-10-2738-2 024 7 $a10.1007/978-981-10-2738-3 035 $a(CKB)3710000000873038 035 $a(DE-He213)978-981-10-2738-3 035 $a(MiAaPQ)EBC6302794 035 $a(MiAaPQ)EBC5596404 035 $a(Au-PeEL)EBL5596404 035 $a(OCoLC)958930548 035 $a(PPN)195511891 035 $a(EXLCZ)993710000000873038 100 $a20160916d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Computing and Communications $e4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /$fedited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero 205 $a1st ed. 2016. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2016. 215 $a1 online resource (XXII, 474 p. 179 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v625 311 08$a981-10-2737-4 327 $aCryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. . 330 $aThis book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v625 606 $aData protection 606 $aArtificial intelligence$xData processing 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData and Information Security 606 $aData Science 606 $aCryptology 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aArtificial intelligence$xData processing. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aData Science. 615 24$aCryptology. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aMueller$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThampi$b Sabu M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlam Bhuiyan$b Md Zakirul$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKo$b Ryan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDoss$b Robin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlcaraz Calero$b Jose M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254987503321 996 $aSecurity in Computing and Communications$92256445 997 $aUNINA LEADER 04547nam 22006855 450 001 9910484995703321 005 20251226202927.0 010 $a3-642-02652-4 024 7 $a10.1007/978-3-642-02652-2 035 $a(CKB)1000000000753981 035 $a(SSID)ssj0000318969 035 $a(PQKBManifestationID)11255729 035 $a(PQKBTitleCode)TC0000318969 035 $a(PQKBWorkID)10336289 035 $a(PQKB)10263954 035 $a(DE-He213)978-3-642-02652-2 035 $a(MiAaPQ)EBC3064326 035 $a(PPN)136307027 035 $a(EXLCZ)991000000000753981 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aModel Checking Software $e16th International SPIN Workshop, Grenoble, France, June 26-28, 2009, Proceedings /$fedited by Corina S Pasareanu 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 297 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v5578 300 $aThis volume contains the proceedings of the 16th International SPIN Workshop on Model Checking of Software (SPIN 2009), that was held at the Grenoble World Trade Center, in Grenoble France, June 26-28, 2009.--Pref. 311 08$a3-642-02651-6 320 $aIncludes bibliographical references and index. 327 $aInvited Contributions -- Software Model Checking Improving Security of a Billion Computers -- On Quantitative Software Verification -- The Quest for Correctness-Beyond a Posteriori Verification -- Who Really Cares If the Program Crashes? -- Regular Papers -- Tool Presentation: Teaching Concurrency and Model Checking -- Fast, All-Purpose State Storage -- Efficient Probabilistic Model Checking on General Purpose Graphics Processors -- Improving Non-Progress Cycle Checks -- Reduction of Verification Conditions for Concurrent System Using Mutually Atomic Transactions -- Probabilistic Reachability for Parametric Markov Models -- Extrapolation-Based Path Invariants for Abstraction Refinement of Fifo Systems -- A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks -- Eclipse Plug-In for Spin and st2msc Tools-Tool Presentation -- Symbolic Analysis via Semantic Reinterpretation -- EMMA: Explicit Model Checking Manager (Tool Presentation) -- Efficient Testing of Concurrent Programs with Abstraction-Guided Symbolic Execution -- Subsumer-First: Steering Symbolic Reachability Analysis -- Identifying Modeling Errors in Signatures by Model Checking -- Towards Verifying Correctness of Wireless Sensor Network Applications Using Insense and Spin -- Verification of GALS Systems by Combining Synchronous Languages and Process Calculi -- Experience with Model Checking Linearizability -- Automatic Discovery of Transition Symmetry in Multithreaded Programs Using Dynamic Analysis. 330 $aThis book constitutes the refereed proceedings of the 16th International SPIN workshop on Model Checking Software, SPIN 2009, held in Grenoble, France, in June 2009. The 15 revised full papers presented together with 3 tool papers and 4 invited talks were carefully reviewed and selected from 41 submissions. The papers cover theoretical and algorithmic foundations as well as tools for software model checking by addressing theoretical advances and empirical evaluations related to state-space and path exploration techniques, as implemented in software verification tools. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v5578 606 $aSoftware engineering 606 $aCompilers (Computer programs) 606 $aComputer science 606 $aSoftware Engineering 606 $aCompilers and Interpreters 606 $aComputer Science Logic and Foundations of Programming 615 0$aSoftware engineering. 615 0$aCompilers (Computer programs). 615 0$aComputer science. 615 14$aSoftware Engineering. 615 24$aCompilers and Interpreters. 615 24$aComputer Science Logic and Foundations of Programming. 676 $a005.1 686 $aDAT 325f$2stub 686 $aSS 4800$2rvk 701 $aPasareanu$b Corina S$0905882 712 12$aInternational SPIN Workshop 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484995703321 996 $aModel checking software$94185163 997 $aUNINA