Algebraic Methodology and Software Technology [[electronic resource] ] : 13th International Conference, AMAST 2010, Lac-Beauport, QC, Canada, June 23-25, 2010, Revised Selected Papers / / edited by Michael Johnson, Dusko Pavlovic |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (X, 238 p. 46 illus., 10 illus. in color.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Computer logic Programming languages (Electronic computers) Mathematical logic Artificial intelligence Computer programming Software Engineering Logics and Meanings of Programs Programming Languages, Compilers, Interpreters Mathematical Logic and Formal Languages Artificial Intelligence Programming Techniques |
Soggetto genere / forma | Conference papers and proceedings. |
ISBN | 3-642-17796-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Invited paper -- pt. 2. Contributed research papers -- pt. 3. System demonstrations. |
Record Nr. | UNISA-996466032603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations of Security, Protocols, and Equational Reasoning [[electronic resource] ] : Essays Dedicated to Catherine A. Meadows / / edited by Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XII, 239 p. 273 illus., 24 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Computer organization Computers and civilization Software engineering Programming languages (Electronic computers) Computer logic Security Computer Systems Organization and Communication Networks Computers and Society Software Engineering Programming Languages, Compilers, Interpreters Logics and Meanings of Programs |
ISBN | 3-030-19052-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cathy Meadows: A Central Figure in Protocol Analysis -- A Long, Slow Conversation -- Key Reminiscences -- Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method -- Finding Intruder Knowledge with Cap Matching -- Robust Declassification by Incremental Typing -- JRIF: Reactive Information Flow Control for Java -- Symbolic Timed Trace Equivalence -- Symbolic Analysis of Identity-Based Protocols -- Enrich-by-Need Protocol Analysis for Diffie-Hellman -- Key Agreement via Protocols -- Privacy protocols -- A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols -- Belenios: A Simple Private and Verifiable Electronic Voting System. |
Record Nr. | UNISA-996466180903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Foundations of Security, Protocols, and Equational Reasoning : Essays Dedicated to Catherine A. Meadows / / edited by Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XII, 239 p. 273 illus., 24 illus. in color.) |
Disciplina |
005.8
005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data protection
Computer organization Computers and civilization Software engineering Programming languages (Electronic computers) Computer logic Security Computer Systems Organization and Communication Networks Computers and Society Software Engineering Programming Languages, Compilers, Interpreters Logics and Meanings of Programs |
ISBN | 3-030-19052-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cathy Meadows: A Central Figure in Protocol Analysis -- A Long, Slow Conversation -- Key Reminiscences -- Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method -- Finding Intruder Knowledge with Cap Matching -- Robust Declassification by Incremental Typing -- JRIF: Reactive Information Flow Control for Java -- Symbolic Timed Trace Equivalence -- Symbolic Analysis of Identity-Based Protocols -- Enrich-by-Need Protocol Analysis for Diffie-Hellman -- Key Agreement via Protocols -- Privacy protocols -- A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols -- Belenios: A Simple Private and Verifiable Electronic Voting System. |
Record Nr. | UNINA-9910337842103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|