語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protocols, Strands, and Logic = Essa...
~
Mödersheim, Sebastian Alexander.
Protocols, Strands, and Logic = Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Protocols, Strands, and Logic/ edited by Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe.
其他題名:
Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
其他作者:
Rowe, Paul.
面頁冊數:
X, 425 p. 65 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Cryptology. -
電子資源:
https://doi.org/10.1007/978-3-030-91631-2
ISBN:
9783030916312
Protocols, Strands, and Logic = Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
Protocols, Strands, and Logic
Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /[electronic resource] :edited by Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe. - 1st ed. 2021. - X, 425 p. 65 illus.online resource. - Security and Cryptology ;13066. - Security and Cryptology ;9241.
Cryptography -- Cryptographic Protocols -- Protocol Analysis -- CPSA -- Cybersecurity -- Formal Methods -- Strand Spaces -- Automated Verification -- Model Finding -- Logic -- Attestation -- Accountability -- Differential Privacy -- Quantum Computing -- Game Theory -- Mobile Computing -- Multiset Rewriting -- Proofs and Refutations.
This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua’s most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.
ISBN: 9783030916312
Standard No.: 10.1007/978-3-030-91631-2doiSubjects--Topical Terms:
1211076
Cryptology.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Protocols, Strands, and Logic = Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
LDR
:02789nam a22004215i 4500
001
1057230
003
DE-He213
005
20211118210141.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030916312
$9
978-3-030-91631-2
024
7
$a
10.1007/978-3-030-91631-2
$2
doi
035
$a
978-3-030-91631-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Protocols, Strands, and Logic
$h
[electronic resource] :
$b
Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday /
$c
edited by Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
X, 425 p. 65 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
13066
505
0
$a
Cryptography -- Cryptographic Protocols -- Protocol Analysis -- CPSA -- Cybersecurity -- Formal Methods -- Strand Spaces -- Automated Verification -- Model Finding -- Logic -- Attestation -- Accountability -- Differential Privacy -- Quantum Computing -- Game Theory -- Mobile Computing -- Multiset Rewriting -- Proofs and Refutations.
520
$a
This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua’s most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.
650
2 4
$a
Cryptology.
$3
1211076
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer security.
$3
557122
700
1
$a
Rowe, Paul.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1362657
700
1
$a
Mödersheim, Sebastian Alexander.
$e
editor.
$1
https://orcid.org/0000-0002-6901-8319
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1362656
700
1
$a
Meseguer, José.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1307614
700
1
$a
Dougherty, Daniel.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1362655
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030916305
776
0 8
$i
Printed edition:
$z
9783030916329
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-91631-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入