Foundations of Security, Protocols, and Equational Reasoning
Title | Foundations of Security, Protocols, and Equational Reasoning PDF eBook |
Author | Joshua D. Guttman |
Publisher | Springer |
Pages | 250 |
Release | 2019-05-17 |
Genre | Computers |
ISBN | 3030190528 |
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.
Foundations of Security Analysis and Design
Title | Foundations of Security Analysis and Design PDF eBook |
Author | Riccardo Focardi |
Publisher | Springer |
Pages | 406 |
Release | 2003-06-30 |
Genre | Computers |
ISBN | 3540456082 |
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).
Foundations of Security Analysis and Design V
Title | Foundations of Security Analysis and Design V PDF eBook |
Author | Alessandro Aldini |
Publisher | Springer Science & Business Media |
Pages | 347 |
Release | 2009-08-17 |
Genre | Business & Economics |
ISBN | 364203828X |
This book presents tutorial lectures from three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009. Topics include cryptographic protocol analysis, identity management and electronic voting, and wireless security.
Rewriting Logic and Its Applications
Title | Rewriting Logic and Its Applications PDF eBook |
Author | Kyungmin Bae |
Publisher | Springer Nature |
Pages | 299 |
Release | 2022-07-29 |
Genre | Computers |
ISBN | 3031124413 |
This book constitutes selected papers from the refereed proceedings of the 14th International Workshop on Rewriting Logic and Its Applications, WRLA 2022, held in Munich, Germany, in April 2022. The 9 full papers included in this book were carefully reviewed and selected from 13 submissions. They focus on topics in rewriting logic and its applications. The book also contains 2 invited papers, 2 invited tutorials and an experience report.
Computer Security – ESORICS 2022
Title | Computer Security – ESORICS 2022 PDF eBook |
Author | Vijayalakshmi Atluri |
Publisher | Springer Nature |
Pages | 754 |
Release | 2022-09-22 |
Genre | Computers |
ISBN | 3031171462 |
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
Electronic Voting
Title | Electronic Voting PDF eBook |
Author | David Duenas-Cid |
Publisher | Springer Nature |
Pages | 186 |
Release | |
Genre | |
ISBN | 3031722442 |
Foundations of Software Science and Computation Structures
Title | Foundations of Software Science and Computation Structures PDF eBook |
Author | Igor Walukiewicz |
Publisher | Springer |
Pages | 543 |
Release | 2004-03-04 |
Genre | Computers |
ISBN | 3540247270 |
ETAPS 2004 was the seventh instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprised ?ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), 23 satellite workshops, 1 tutorial, and 7 invited lectures (not including those that are speci?c to the satellite events). The events that comprise ETAPS address various aspects of the system - velopment process, including speci?cation, design, implementation, analysis and improvement. The languages, methodologies and tools that support these - tivities are all well within its scope. Di?erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on the one hand and soundly based practice on the other. Many of the issues inv- ved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.