Formal Aspects of Security [electronic resource] : First International Conference, FASec 2002, London, UK, December 16-18, 2002. Revised Papers / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider.
Material type:
TextSeries: Lecture Notes in Computer Science ; 2629Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003Description: X, 246 p. online resourceContent type: - text
- computer
- online resource
- 9783540409816
- Computer science
- Computer Communication Networks
- Software engineering
- Operating systems (Computers)
- Data encryption (Computer science)
- Information Systems
- Computer Science
- Data Encryption
- Computer Communication Networks
- Software Engineering
- Operating Systems
- Computers and Society
- Management of Computing and Information Systems
- 005.82 23
- QA76.9.A25
E-BOOKS
| Home library | Call number | Materials specified | URL | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
| IMSc Library | Link to resource | Available | EBK4838 |
Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems.
There are no comments on this title.