Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer |
Pubbl/distr/stampa | Washington, D.C., : IOS Press, 2011 |
Descrizione fisica | 1 online resource (312 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CortierVéronique
KremerSteve |
Collana | Cryptology and information security series |
Soggetto topico | Computer security |
ISBN |
6613289612
1-283-28961-X 9786613289612 1-60750-714-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author Index |
Record Nr. | UNINA-9910781756303321 |
Washington, D.C., : IOS Press, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer |
Pubbl/distr/stampa | Washington, D.C., : IOS Press, 2011 |
Descrizione fisica | 1 online resource (312 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CortierVéronique
KremerSteve |
Collana | Cryptology and information security series |
Soggetto topico | Computer security |
ISBN |
6613289612
1-283-28961-X 9786613289612 1-60750-714-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author Index |
Record Nr. | UNINA-9910828353003321 |
Washington, D.C., : IOS Press, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 307 p. 48 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) E-commerce Management information systems Computer science Algorithms Systems and Data Security Computer Communication Networks Cryptology e-Commerce/e-business Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
Soggetto non controllato |
POST
Software ETAPS Security |
ISBN | 3-642-54792-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks. |
Record Nr. | UNISA-996203270903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Principles of Security and Trust : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 307 p. 48 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) E-commerce Management information systems Computer science Algorithms Systems and Data Security Computer Communication Networks Cryptology e-Commerce/e-business Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
Soggetto non controllato |
POST
Software ETAPS Security |
ISBN | 3-642-54792-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks. |
Record Nr. | UNINA-9910484856903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|