Cargando…

Formal models and techniques for analyzing security protocols /

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: IOS Press
Otros Autores: Cortier, Véronique, Kremer, Steve
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Da Washington, DC : IOS Press, ©2011.
Colección:Cryptology and information security series ; v. 5.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn758834764
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 111027s2011 ne a ob 001 0 eng d
040 |a IOSPR  |b eng  |e pn  |c IOSPR  |d N$T  |d YDXCP  |d E7B  |d CDX  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d NLGGC  |d EBLCP  |d IDEBK  |d CEF  |d OCLCQ  |d OCLCO  |d OCLCF  |d S3O  |d OCLCQ  |d AGLDB  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d VTS  |d ICG  |d OCLCQ  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d JBG  |d OCLCQ  |d STF  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d AJS  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 756484738  |a 1055385008  |a 1058000563  |a 1066430311  |a 1081185947  |a 1228530613 
020 |a 9781607507147  |q (electronic bk.) 
020 |a 1607507145  |q (electronic bk.) 
020 |a 1607507137 
020 |a 9781607507130 
020 |z 9781607507130  |q (hardcover) 
029 1 |a AU@  |b 000050054069 
029 1 |a AU@  |b 000050608292 
029 1 |a AU@  |b 000051364971 
029 1 |a AU@  |b 000053277265 
029 1 |a CHNEW  |b 000617108 
029 1 |a DEBBG  |b BV043069098 
029 1 |a DEBBG  |b BV044158422 
029 1 |a DEBSZ  |b 372885748 
029 1 |a DEBSZ  |b 421525630 
029 1 |a DEBSZ  |b 431048029 
029 1 |a GBVCP  |b 803672438 
029 1 |a HEBIS  |b 299831655 
029 1 |a NZ1  |b 14257067 
035 |a (OCoLC)758834764  |z (OCoLC)756484738  |z (OCoLC)1055385008  |z (OCoLC)1058000563  |z (OCoLC)1066430311  |z (OCoLC)1081185947  |z (OCoLC)1228530613 
037 |a 978-1-60750-714-7  |b IOS Press  |n http://www.iospress.nl 
050 4 |a QA76.9.A25  |b F654 2011 
072 7 |a COM053000  |x COM  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Formal models and techniques for analyzing security protocols /  |c edited by Véronique Cortier and Steve Kremer. 
260 |a Amsterdam ;  |a Da Washington, DC :  |b IOS Press,  |c ©2011. 
300 |a 1 online resource (vii, 303 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cryptology and information security series ;  |v v. 5 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index. 
520 |a Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Electronic information resources  |x Access control. 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sources d'information électroniques  |x Accès  |x Contrôle. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Electronic information resources  |x Access control  |2 fast 
700 1 |a Cortier, Véronique. 
700 1 |a Kremer, Steve. 
710 2 |a IOS Press. 
758 |i has work:  |a Formal models and techniques for analyzing security protocols (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFC8HHcqTCHpPqf4wbHcj3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Formal models and techniques for analyzing security protocols.  |d Amsterdam ; da Washington, DC : IOS Press, ©2011  |z 9781607507130  |w (OCoLC)705518947 
830 0 |a Cryptology and information security series ;  |v v. 5. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=784604  |z Texto completo 
938 |a Coutts Information Services  |b COUT  |n 19558387 
938 |a EBL - Ebook Library  |b EBLB  |n EBL784604 
938 |a ebrary  |b EBRY  |n ebr10506344 
938 |a EBSCOhost  |b EBSC  |n 395231 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 328961 
938 |a YBP Library Services  |b YANK  |n 3639903 
994 |a 92  |b IZTAP