語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Foundations of Security, Protocols, ...
~
SpringerLink (Online service)
Foundations of Security, Protocols, and Equational Reasoning = Essays Dedicated to Catherine A. Meadows /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Foundations of Security, Protocols, and Equational Reasoning/ edited by Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic.
其他題名:
Essays Dedicated to Catherine A. Meadows /
其他作者:
Guttman, Joshua D.
面頁冊數:
XII, 239 p. 273 illus., 24 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-3-030-19052-1
ISBN:
9783030190521
Foundations of Security, Protocols, and Equational Reasoning = Essays Dedicated to Catherine A. Meadows /
Foundations of Security, Protocols, and Equational Reasoning
Essays Dedicated to Catherine A. Meadows /[electronic resource] :edited by Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic. - 1st ed. 2019. - XII, 239 p. 273 illus., 24 illus. in color.online resource. - Security and Cryptology ;11565. - Security and Cryptology ;9241.
Cathy Meadows: A Central Figure in Protocol Analysis -- A Long, Slow Conversation -- Key Reminiscences -- Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method -- Finding Intruder Knowledge with Cap Matching -- Robust Declassification by Incremental Typing -- JRIF: Reactive Information Flow Control for Java -- Symbolic Timed Trace Equivalence -- Symbolic Analysis of Identity-Based Protocols -- Enrich-by-Need Protocol Analysis for Diffie-Hellman -- Key Agreement via Protocols -- Privacy protocols -- A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols -- Belenios: A Simple Private and Verifiable Electronic Voting System.
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification. .
ISBN: 9783030190521
Standard No.: 10.1007/978-3-030-19052-1doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Foundations of Security, Protocols, and Equational Reasoning = Essays Dedicated to Catherine A. Meadows /
LDR
:03357nam a22004095i 4500
001
1013320
003
DE-He213
005
20200704135939.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030190521
$9
978-3-030-19052-1
024
7
$a
10.1007/978-3-030-19052-1
$2
doi
035
$a
978-3-030-19052-1
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Foundations of Security, Protocols, and Equational Reasoning
$h
[electronic resource] :
$b
Essays Dedicated to Catherine A. Meadows /
$c
edited by Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XII, 239 p. 273 illus., 24 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11565
505
0
$a
Cathy Meadows: A Central Figure in Protocol Analysis -- A Long, Slow Conversation -- Key Reminiscences -- Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method -- Finding Intruder Knowledge with Cap Matching -- Robust Declassification by Incremental Typing -- JRIF: Reactive Information Flow Control for Java -- Symbolic Timed Trace Equivalence -- Symbolic Analysis of Identity-Based Protocols -- Enrich-by-Need Protocol Analysis for Diffie-Hellman -- Key Agreement via Protocols -- Privacy protocols -- A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols -- Belenios: A Simple Private and Verifiable Electronic Voting System.
520
$a
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification. .
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer organization.
$3
596298
650
0
$a
Computers and civilization.
$3
556557
650
0
$a
Software engineering.
$3
562952
650
0
$a
Programming languages (Electronic computers).
$3
1127615
650
0
$a
Computer logic.
$3
786340
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Computers and Society.
$3
669900
650
2 4
$a
Software Engineering.
$3
669632
650
2 4
$a
Programming Languages, Compilers, Interpreters.
$3
669782
650
2 4
$a
Logics and Meanings of Programs.
$3
670058
700
1
$a
Guttman, Joshua D.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
891195
700
1
$a
Landwehr, Carl E.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1307613
700
1
$a
Meseguer, José.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1307614
700
1
$a
Pavlovic, Dusko.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
784005
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030190514
776
0 8
$i
Printed edition:
$z
9783030190538
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-19052-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入