Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Operational Semantics and Verification of Security Protocols

Previously published in hardcover
BuchKartoniert, Paperback
174 Seiten
Englisch
Springererschienen am09.11.20142012
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves.mehr
Verfügbare Formate
BuchGebunden
EUR69,54
BuchKartoniert, Paperback
EUR53,45
E-BookPDF1 - PDF WatermarkE-Book
EUR50,28

Produkt

KlappentextSecurity protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves.
ZusammenfassungThis account of an effective methodology for defining and verifying security protocols in network communication includes an accompanying tool set that will be of great interest to researchers and advanced professionals working on critical security protocols.
Details
ISBN/GTIN978-3-642-43053-4
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2014
Erscheinungsdatum09.11.2014
Auflage2012
Seiten174 Seiten
SpracheEnglisch
Gewicht300 g
IllustrationenXIV, 174 p.
Artikel-Nr.15547324

Inhalt/Kritik

Inhaltsverzeichnis
Introduction.- Preliminaries.- Operational Semantics.- Security Properties.- Verification.- Multiprotocol Attacks.- Generalizing NSL for Multiparty Authentication.- Related Work.- Conclusions and Future Work.- Index.mehr
Kritik
"This book is a great resource for anyone who wants to do research in the security analysis of protocols. It is written in a textbook style by authors who have excellent command over the subject. It could be used for self-study too ... overall the book does superb justice to the subject in every aspect."
[Sashank Dara, Cisco Systems Inc., IACR Book Reviews, 12/2014]
mehr

Autor


The first author is a senior scientist working at the ETH Zürich, the second author is a professor at the Université du Luxembourg; both have a research focus and teaching responsibilities in the areas of information security, protocols, privacy, trust and formal methods.