Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XI, 343 p.) |
Disciplina | 004n/a |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer security
Computer communication systems Software engineering Computers Special purpose computers Systems and Data Security Computer Communication Networks Software Engineering/Programming and Operating Systems Information Systems and Communication Service Software Engineering Special Purpose and Application-Based Systems |
Soggetto genere / forma |
Hamburg (2009)
Kongress. |
ISBN | 3-642-04468-9 |
Classificazione |
DAT 050f
DAT 260f DAT 343f DAT 460f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systems -- Medical Systems -- Model-Based Development of Medical Devices -- Why Are People’s Decisions Sometimes Worse with Computer Support? -- Industrial Experience -- Safety-Related Application Conditions – A Balance between Safety Relevance and Handicaps for Applications -- Probability of Failure on Demand – The Why and the How -- Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Systems -- Security Risk Analysis -- Exploring Network Security in PROFIsafe -- Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorithms -- Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security -- Safety Guidelines -- Experiences with the Certification of a Generic Functional Safety Management Structure According to IEC 61508 -- Analysing Dependability Case Arguments Using Quality Models -- Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB -- Automotive -- Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats -- Safety Requirements for a Cooperative Traffic Management System: The Human Interface Perspective -- Aerospace -- The COMPASS Approach: Correctness, Modelling and Performability of Aerospace Systems -- Formal Verification of a Microkernel Used in Dependable Software Systems -- Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do -- Verification, Validation, Test -- Probabilistic Failure Propagation and Transformation Analysis -- Towards Model-Based Automatic Testing of Attack Scenarios -- CRIOP: A Human Factors Verification and Validation Methodology That Works in an Industrial Setting -- Fault Tolerance -- Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure -- Increasing the Reliability of High Redundancy Actuators by Using Elements in Series and Parallel -- AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware -- Dependability -- Component-Based Abstraction in Fault Tree Analysis -- A Foundation for Requirements Analysis of Dependable Software -- Establishing a Framework for Dynamic Risk Management in ‘Intelligent’ Aero-Engine Control. |
Record Nr. | UNISA-996465672203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XI, 343 p.) |
Disciplina | 004n/a |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer security
Computer communication systems Software engineering Computers Special purpose computers Systems and Data Security Computer Communication Networks Software Engineering/Programming and Operating Systems Information Systems and Communication Service Software Engineering Special Purpose and Application-Based Systems |
Soggetto genere / forma |
Hamburg (2009)
Kongress. |
ISBN | 3-642-04468-9 |
Classificazione |
DAT 050f
DAT 260f DAT 343f DAT 460f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systems -- Medical Systems -- Model-Based Development of Medical Devices -- Why Are People’s Decisions Sometimes Worse with Computer Support? -- Industrial Experience -- Safety-Related Application Conditions – A Balance between Safety Relevance and Handicaps for Applications -- Probability of Failure on Demand – The Why and the How -- Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Systems -- Security Risk Analysis -- Exploring Network Security in PROFIsafe -- Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorithms -- Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security -- Safety Guidelines -- Experiences with the Certification of a Generic Functional Safety Management Structure According to IEC 61508 -- Analysing Dependability Case Arguments Using Quality Models -- Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB -- Automotive -- Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats -- Safety Requirements for a Cooperative Traffic Management System: The Human Interface Perspective -- Aerospace -- The COMPASS Approach: Correctness, Modelling and Performability of Aerospace Systems -- Formal Verification of a Microkernel Used in Dependable Software Systems -- Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do -- Verification, Validation, Test -- Probabilistic Failure Propagation and Transformation Analysis -- Towards Model-Based Automatic Testing of Attack Scenarios -- CRIOP: A Human Factors Verification and Validation Methodology That Works in an Industrial Setting -- Fault Tolerance -- Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure -- Increasing the Reliability of High Redundancy Actuators by Using Elements in Series and Parallel -- AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware -- Dependability -- Component-Based Abstraction in Fault Tree Analysis -- A Foundation for Requirements Analysis of Dependable Software -- Establishing a Framework for Dynamic Risk Management in ‘Intelligent’ Aero-Engine Control. |
Record Nr. | UNINA-9910484216803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Critical Information Infrastructure Security [[electronic resource] ] : Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 / / edited by Roberto Setola, Stefan Geretshuber |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 396 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Quality control Reliability Industrial safety Applied mathematics Engineering mathematics Management information systems Computer science Algorithms Systems and Data Security Computer Communication Networks Quality Control, Reliability, Safety and Risk Mathematical and Computational Engineering Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
Soggetto genere / forma |
Kongress.
Rom(2008) |
ISBN | 3-642-03552-3 |
Classificazione |
DAT 460f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies -- Stability of a Distributed Generation Network Using the Kuramoto Models -- Enabling System of Systems Analysis of Critical Infrastructure Behaviors -- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS -- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures -- Interdependency Analysis in Electric Power Systems -- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach -- Self-healing and Resilient Critical Infrastructures -- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking -- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project -- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL -- Information Modelling and Simulation in Large Dependent Critical Infrastructures – An Overview on the European Integrated Project IRRIIS -- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks -- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure -- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support -- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures -- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector -- Analysis of Malicious Traffic in Modbus/TCP Communications -- Scada Malware, a Proof of Concept -- Testbeds for Assessing Critical Scenarios in Power Control Systems -- A Structured Approach to Incident Response Management in the Oil and Gas Industry -- Security Strategy Analysis for Critical Information Infrastructures -- Emerging Information Infrastructures: Cooperation in Disasters -- Service Modeling Language Applied to Critical Infrastructure -- Graded Security Expert System -- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel -- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem -- Empirical Findings on Critical Infrastructure Dependencies in Europe -- Dependent Automata for the Modelling of Dependencies -- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making -- Disaster Propagation in Heterogeneous Media via Markovian Agents -- A Study on Multiformalism Modeling of Critical Infrastructures -- Simulation of Critical ICT Infrastructure for Municipal Crisis Management -- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning -- Security of Water Infrastructure Systems -- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture -- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure -- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures. |
Record Nr. | UNISA-996465627503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructure Security : Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 / / edited by Roberto Setola, Stefan Geretshuber |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 396 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Quality control Reliability Industrial safety Applied mathematics Engineering mathematics Management information systems Computer science Algorithms Systems and Data Security Computer Communication Networks Quality Control, Reliability, Safety and Risk Mathematical and Computational Engineering Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
Soggetto genere / forma |
Kongress.
Rom(2008) |
ISBN | 3-642-03552-3 |
Classificazione |
DAT 460f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies -- Stability of a Distributed Generation Network Using the Kuramoto Models -- Enabling System of Systems Analysis of Critical Infrastructure Behaviors -- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS -- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures -- Interdependency Analysis in Electric Power Systems -- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach -- Self-healing and Resilient Critical Infrastructures -- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking -- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project -- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL -- Information Modelling and Simulation in Large Dependent Critical Infrastructures – An Overview on the European Integrated Project IRRIIS -- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks -- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure -- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support -- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures -- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector -- Analysis of Malicious Traffic in Modbus/TCP Communications -- Scada Malware, a Proof of Concept -- Testbeds for Assessing Critical Scenarios in Power Control Systems -- A Structured Approach to Incident Response Management in the Oil and Gas Industry -- Security Strategy Analysis for Critical Information Infrastructures -- Emerging Information Infrastructures: Cooperation in Disasters -- Service Modeling Language Applied to Critical Infrastructure -- Graded Security Expert System -- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel -- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem -- Empirical Findings on Critical Infrastructure Dependencies in Europe -- Dependent Automata for the Modelling of Dependencies -- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making -- Disaster Propagation in Heterogeneous Media via Markovian Agents -- A Study on Multiformalism Modeling of Critical Infrastructures -- Simulation of Critical ICT Infrastructure for Municipal Crisis Management -- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning -- Security of Water Infrastructure Systems -- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture -- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure -- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures. |
Record Nr. | UNINA-9910485147903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings / / edited by Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 207 p. 55 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Computer communication systems Architecture, Computer Management information systems Computer science Software engineering Systems and Data Security e-Commerce/e-business Computer Communication Networks Computer System Implementation Management of Computing and Information Systems Software Engineering |
Soggetto genere / forma |
Kongress2013.Berlin
Conference proceedings. |
ISBN | 3-642-39235-0 |
Classificazione |
DAT 055f
DAT 460f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware -- Network security -- Web security -- Attacks and defenses -- Host security. |
Record Nr. | UNISA-996466258403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings / / edited by Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 207 p. 55 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Computer communication systems Architecture, Computer Management information systems Computer science Software engineering Systems and Data Security e-Commerce/e-business Computer Communication Networks Computer System Implementation Management of Computing and Information Systems Software Engineering |
Soggetto genere / forma |
Kongress2013.Berlin
Conference proceedings. |
ISBN | 3-642-39235-0 |
Classificazione |
DAT 055f
DAT 460f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware -- Network security -- Web security -- Attacks and defenses -- Host security. |
Record Nr. | UNINA-9910483726603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 225 p.) |
Disciplina | 004n/a |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computer communication systems Computer security Computers and civilization Cryptology Management of Computing and Information Systems Computer Communication Networks Systems and Data Security Computers and Society |
Soggetto genere / forma |
Como (2009)
Kongress. |
ISBN | 3-642-02918-3 |
Classificazione |
DAT 460f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection. |
Record Nr. | UNISA-996465430203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 225 p.) |
Disciplina | 004n/a |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Management information systems Computer science Computer communication systems Computer security Computers and civilization Cryptology Management of Computing and Information Systems Computer Communication Networks Systems and Data Security Computers and Society |
Soggetto genere / forma |
Como (2009)
Kongress. |
ISBN | 3-642-02918-3 |
Classificazione |
DAT 460f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection. |
Record Nr. | UNINA-9910484356103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal to Practical Security [[electronic resource] ] : Papers Issued from the 2005-2008 French-Japanese Collaboration / / edited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (VII, 199 p.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer programming Pattern recognition Computers and civilization Data structures (Computer science) Biometrics (Biology) Cryptology Programming Techniques Pattern Recognition Computers and Society Data Structures and Information Theory Biometrics |
Soggetto genere / forma | Aufsatzsammlung |
ISBN | 3-642-02002-X |
Classificazione |
DAT 460f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal to Practical Security -- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables -- Validating Integrity for the Ephemerizer’s Protocol with CL-Atse -- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols -- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin -- Comparing State Spaces in Automatic Security Protocol Analysis -- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures -- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment -- New Anonymity Notions for Identity-Based Encryption -- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption -- Writing an OS Kernel in a Strictly and Statically Typed Language. |
Record Nr. | UNISA-996466267503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal to Practical Security : Papers Issued from the 2005-2008 French-Japanese Collaboration / / edited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (VII, 199 p.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer programming Pattern recognition Computers and civilization Data structures (Computer science) Biometrics (Biology) Cryptology Programming Techniques Pattern Recognition Computers and Society Data Structures and Information Theory Biometrics |
Soggetto genere / forma | Aufsatzsammlung |
ISBN | 3-642-02002-X |
Classificazione |
DAT 460f
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal to Practical Security -- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables -- Validating Integrity for the Ephemerizer’s Protocol with CL-Atse -- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols -- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin -- Comparing State Spaces in Automatic Security Protocol Analysis -- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures -- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment -- New Anonymity Notions for Identity-Based Encryption -- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption -- Writing an OS Kernel in a Strictly and Statically Typed Language. |
Record Nr. | UNINA-9910484890203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|