|
" Principles of security and trust : "
David Basin, John C. Mitchell (eds.).
Document Type
|
:
|
BL
|
Record Number
|
:
|
747879
|
Doc. No
|
:
|
b567830
|
Main Entry
|
:
|
David Basin, John C. Mitchell (eds.).
|
Title & Author
|
:
|
Principles of security and trust : : second international conference, POST 2013, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013 : proceedings\ David Basin, John C. Mitchell (eds.).
|
Publication Statement
|
:
|
Berlin ; New York : Springer, ©2013.
|
Series Statement
|
:
|
Lecture notes in computer science, 7796.; Lecture notes in computer science., Advanced research in computing and software science.; LNCS sublibrary., SL 4,, Security and cryptology.
|
Page. NO
|
:
|
xx, 286 pages : illustrations ; 24 cm.
|
ISBN
|
:
|
3642368298
|
|
:
|
: 9783642368295
|
Notes
|
:
|
International conference proceedings.
|
Contents
|
:
|
Regular Papers --; Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks / Rémy Chrétien, Stéphanie Delaune --; Practical Everlasting Privacy / Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan --; A Differentially Private Mechanism of Optimal Utility for a Region of Priors / Ehab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi --; Proved Generation of Implementations from Computationally Secure Protocol Specifications / David Cadé, Bruno Blanchet --; Sound Security Protocol Transformations / Binh Thanh Nguyen, Christoph Sprenger. Logical Foundations of Secure Resource Management in Protocol Implementations / Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei --; Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage / Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis --; Lazy Mobile Intruders / Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson --; On Layout Randomization for Arrays and Functions / Martín Abadi, Jérémy Planul --; A Theory of Agreements and Protection / Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino. Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification / Michael Backes, Fabian Bendun, Dominique Unruh --; Proving More Observational Equivalences with ProVerif / Vincent Cheval, Bruno Blanchet --; Formal Verification of e-Auction Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech --; Sessions and Separability in Security Protocols / Marco Carbone, Joshua D. Guttman.
|
Subject
|
:
|
Computer networks -- Security measures -- Congresses.
|
Subject
|
:
|
Computer security -- Congresses.
|
Subject
|
:
|
Data encryption (Computer science) -- Congresses.
|
LC Classification
|
:
|
QA76.9.A25D385 2013
|
Added Entry
|
:
|
David Basin
|
|
:
|
John C Mitchell
|
Parallel Title
|
:
|
POST 2013; ETAPS 2013
|
| |