Formal to Practical Security
Springer Berlin (Verlag)
978-3-642-02001-8 (ISBN)
Formal to Practical Security.- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables.- Validating Integrity for the Ephemerizer's Protocol with CL-Atse.- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin.- Comparing State Spaces in Automatic Security Protocol Analysis.- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures.- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.- New Anonymity Notions for Identity-Based Encryption.- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption.- Writing an OS Kernel in a Strictly and Statically Typed Language.
Erscheint lt. Verlag | 25.5.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | VII, 199 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 326 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • computational semantics • cryptographic protocols • cryptography • Encryption • fingerprint recognition • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based encryption • integrity validation • privacy • proxy signatures • security • security protocols • verification |
ISBN-10 | 3-642-02001-1 / 3642020011 |
ISBN-13 | 978-3-642-02001-8 / 9783642020018 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich