Formal to Practical Security

Papers Issued from the 2005-2008 French-Japanese Collaboration
Buch | Softcover
VII, 199 Seiten
2009 | 2009
Springer Berlin (Verlag)
978-3-642-02001-8 (ISBN)

Lese- und Medienproben

Formal to Practical Security -
53,49 inkl. MwSt
The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.

Formal to Practical Security.- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables.- Validating Integrity for the Ephemerizer's Protocol with CL-Atse.- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin.- Comparing State Spaces in Automatic Security Protocol Analysis.- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures.- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.- New Anonymity Notions for Identity-Based Encryption.- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption.- Writing an OS Kernel in a Strictly and Statically Typed Language.

Erscheint lt. Verlag 25.5.2009
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo VII, 199 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 326 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte authentication • computational semantics • cryptographic protocols • cryptography • Encryption • fingerprint recognition • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based encryption • integrity validation • privacy • proxy signatures • security • security protocols • verification
ISBN-10 3-642-02001-1 / 3642020011
ISBN-13 978-3-642-02001-8 / 9783642020018
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich