LEADER 00778nam0-22002891i-450- 001 990007045780403321 005 20020213 035 $a000704578 035 $aFED01000704578 035 $a(Aleph)000704578FED01 035 $a000704578 100 $a20020213d1953----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $ay-------001yy 200 1 $aStatus in the common law$fR.H. Graveson 210 $aLondon$cUniversity of London, the Athlone Press$d1953 215 $aXXIV, 151 p.$d24 cm 676 $a340.1$v20$zita 700 1$aGraveson,$bR.H.$0259041 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007045780403321 952 $aII D 33$b45894$fFGBC 959 $aFGBC 996 $aStatus in the common law$9707122 997 $aUNINA LEADER 05188nam 22008415 450 001 996466267503316 005 20201108044445.0 010 $a3-642-02002-X 024 7 $a10.1007/978-3-642-02002-5 035 $a(CKB)1000000000746046 035 $a(SSID)ssj0000317734 035 $a(PQKBManifestationID)11246704 035 $a(PQKBTitleCode)TC0000317734 035 $a(PQKBWorkID)10293133 035 $a(PQKB)11660542 035 $a(DE-He213)978-3-642-02002-5 035 $a(MiAaPQ)EBC3064196 035 $a(PPN)136301223 035 $a(EXLCZ)991000000000746046 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFormal to Practical Security$b[electronic resource] $ePapers Issued from the 2005-2008 French-Japanese Collaboration /$fedited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (VII, 199 p.) 225 1 $aSecurity and Cryptology ;$v5458 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-02001-1 320 $aIncludes bibliographical references and index. 327 $aFormal to Practical Security -- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables -- Validating Integrity for the Ephemerizer?s Protocol with CL-Atse -- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols -- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin -- Comparing State Spaces in Automatic Security Protocol Analysis -- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures -- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment -- New Anonymity Notions for Identity-Based Encryption -- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption -- Writing an OS Kernel in a Strictly and Statically Typed Language. 330 $aThis State-of-the-Art Survey contains a collection of papers originating in the French-Japanese Collaboration on Formal to Practical Security that have crystallized around workshops held in Tokyo and Nancy between 2005 and 2008. These publications mirror the importance of the collaborations in the various fields of computer science to solve these problems linked with other sciences and techniques as well as the importance of bridging the formal theory and practical applications. The 10 papers presented address issues set by the global digitization of our society and its impact on social organization like privacy, economics, environmental policies, national sovereignty, as well as medical environments. The contents cover various aspects of security, cryptography, protocols, biometry and static analysis. This book is aimed at researchers interested in new results but it also serves as an entry point for readers interested in this domain. 410 0$aSecurity and Cryptology ;$v5458 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aPattern recognition 606 $aComputers and civilization 606 $aData structures (Computer science) 606 $aBiometrics (Biology) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aPattern Recognition$3https://scigraph.springernature.com/ontologies/product-market-codes/I2203X 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aBiometrics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22040 608 $aAufsatzsammlung.$2swd 615 0$aData encryption (Computer science). 615 0$aComputer programming. 615 0$aPattern recognition. 615 0$aComputers and civilization. 615 0$aData structures (Computer science). 615 0$aBiometrics (Biology). 615 14$aCryptology. 615 24$aProgramming Techniques. 615 24$aPattern Recognition. 615 24$aComputers and Society. 615 24$aData Structures and Information Theory. 615 24$aBiometrics. 676 $a004 686 $aDAT 460f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aCortier$b Véronique$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKirchner$b Claude$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOkada$b Mitsuhiro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSakurada$b Hideki$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466267503316 996 $aFormal to Practical Security$9774221 997 $aUNISA