Principles of Security and Trust [[electronic resource] ] : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings / / edited by David Basin, John C. Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XX, 287 p. 34 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) E-commerce Management information systems Computer science Systems and Data Security Computer Communication Networks Cryptology e-Commerce/e-business Management of Computing and Information Systems |
ISBN | 3-642-36830-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting Privacy -- A Differentially Private Mechanism of Optimal Utility for a Region of Priors -- Proved Generation of Implementations from Computationally Secure Protocol Specifications -- Sound Security Protocol Transformations -- Logical Foundations of Secure Resource Management in Protocol Implementations -- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage -- Lazy Mobile Intruders -- On Layout Randomization for Arrays and Functions -- A Theory of Agreements and Protection -- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification -- Proving More Observational Equivalences with ProVerif -- Formal Verification of e-Auction Protocols -- Sessions and Separability in Security Protocols. |
Record Nr. | UNISA-996465677703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Principles of Security and Trust : Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings / / edited by David Basin, John C. Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XX, 287 p. 34 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Computer networks Cryptography Data encryption (Computer science) Electronic commerce Electronic data processing—Management Data and Information Security Computer Communication Networks Cryptology e-Commerce and e-Business IT Operations |
ISBN | 3-642-36830-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting Privacy -- A Differentially Private Mechanism of Optimal Utility for a Region of Priors -- Proved Generation of Implementations from Computationally Secure Protocol Specifications -- Sound Security Protocol Transformations -- Logical Foundations of Secure Resource Management in Protocol Implementations -- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage -- Lazy Mobile Intruders -- On Layout Randomization for Arrays and Functions -- A Theory of Agreements and Protection -- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification -- Proving More Observational Equivalences with ProVerif -- Formal Verification of e-Auction Protocols -- Sessions and Separability in Security Protocols. |
Record Nr. | UNINA-9910739418303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|