LEADER 03540nam 22008655 450 001 9910510602803321 005 20251226203944.0 010 $a3-642-28166-4 024 7 $a10.1007/978-3-642-28166-2 035 $a(CKB)3400000000025783 035 $a(SSID)ssj0000666077 035 $a(PQKBManifestationID)11378657 035 $a(PQKBTitleCode)TC0000666077 035 $a(PQKBWorkID)10665791 035 $a(PQKB)10356946 035 $a(DE-He213)978-3-642-28166-2 035 $a(MiAaPQ)EBC3069910 035 $a(PPN)15908752X 035 $a(Association for Computing Machinery)10.5555/2187203 035 $a(EXLCZ)993400000000025783 100 $a20120210d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aEngineering Secure Software and Systems $e4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings /$fedited by Gilles Barthe, Ben Livshits, Riccardo Scandariato 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XII, 151 p. 37 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7159 300 $aInternational conference proceedings. 311 08$a3-642-28165-6 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012. The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions. The full papers present new research results in the field of engineering secure software and systems, whereas the idea papers give crisp expositions of interesting, novel ideas in the early stages of development. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7159 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aComputer science 606 $aComputer Communication Networks 606 $aCryptology 606 $aSoftware Engineering 606 $aData Structures and Information Theory 606 $aMathematical Applications in Computer Science 606 $aModels of Computation 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aSoftware Engineering. 615 24$aData Structures and Information Theory. 615 24$aMathematical Applications in Computer Science. 615 24$aModels of Computation. 676 $a005.8 701 $aBarthe$b Gilles$f1967-$0180568 701 $aLivshits$b Benjamin$01760645 701 $aScandariato$b Riccardo$0904344 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910510602803321 996 $aEngineering secure software and systems$94199720 997 $aUNINA