Formal correctness of security protocols: 4 Tab.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin u.a.
Springer
2007
|
Schriftenreihe: | Information Security and Cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XVIII, 274 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 9783540681342 3540681345 9783642087820 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022311363 | ||
003 | DE-604 | ||
005 | 20150421 | ||
007 | t | ||
008 | 070314s2007 gw d||| |||| 00||| eng d | ||
015 | |a 06,N49,0748 |2 dnb | ||
016 | 7 | |a 98192851X |2 DE-101 | |
020 | |a 9783540681342 |c Gb. : EUR 64.15 (freier Pr.), sfr 106.00 (freier Pr.) |9 978-3-540-68134-2 | ||
020 | |a 3540681345 |c Gb. : EUR 64.15 (freier Pr.), sfr 106.00 (freier Pr.) |9 3-540-68134-5 | ||
020 | |a 9783642087820 |9 978-3-642-08782-0 | ||
024 | 3 | |a 9783540681342 | |
028 | 5 | 2 | |a 11818311 |
035 | |a (OCoLC)180970802 | ||
035 | |a (DE-599)BVBBV022311363 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-384 |a DE-824 |a DE-703 |a DE-20 |a DE-634 |a DE-83 |a DE-11 |a DE-573 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 510 |2 sdnb | ||
100 | 1 | |a Bella, Giampaolo |e Verfasser |4 aut | |
245 | 1 | 0 | |a Formal correctness of security protocols |b 4 Tab. |c Giampaolo Bella |
264 | 1 | |a Berlin u.a. |b Springer |c 2007 | |
300 | |a XVIII, 274 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information Security and Cryptography | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Induktionsbeweis |0 (DE-588)4222014-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatisches Beweisverfahren |0 (DE-588)4069034-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verifikation |0 (DE-588)4135577-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Verifikation |0 (DE-588)4135577-5 |D s |
689 | 0 | 2 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | 3 | |a Induktionsbeweis |0 (DE-588)4222014-2 |D s |
689 | 0 | 4 | |a Automatisches Beweisverfahren |0 (DE-588)4069034-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=2874175&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Augsburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015520913&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-015520913 |
Datensatz im Suchindex
_version_ | 1805088788325597184 |
---|---|
adam_text |
Contents
1.
1.1 Motivation . 4
1.1.1
1.1.2
1.1.3
1.2
1.2.1
1.2.2
1.2.3
1.3
1.3.1
1.3.2
1.3.3
1.4
2.
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.2
2.2.1
2.2.2
2.2.3
2.2.4
3.
3.1
3.2
3.3
XII Contents
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
4.
4.1
4.2
4.3
4.4
4.5
4.6
4.7
5.
5.1
5.2
5.3
5.4
6.
6.1
6.2
6.3
6.4
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.5.6
6.5.7
6.6
7.
7.1
7.1.1
7.1.2
7.2
7.2.1
Contents
7.2.2
7.2.3
7.2.4
7.2.5
7.3
7.3.1
7.3.2
7.3.3
7.3.4
7.3.5
7.3.6
7.3.7
8.
8.1
8.1.1
8.1.2
8.2
8.2.1
8.2.2
8.2.3
8.2.4
8.2.5
8.3
8.3.1
8.3.2
8.4
8.4.1
8.4.2
8.5
8.5.1
8.5.2
8.6
8.6.1
8.6.2
9.
9.1
9.2
9.3
9.3.1
9.3.2
9.3.3
XIV Contents
10.
10.1
10.1.1
10.1.2
10.1.3
10.2
10.3
10.4
10.5
11.
11.1
11.2
11.2.1
11.2.2
11.2.3
11.2.4
11.2.5
11.2.6
11.2.7
11.2.8
11.2.9
11.2.10
11.3
11.3.1
11.3.2
11.3.3
11.3.4
11.3.5
11.3.6
11.3.7
11.4
12.
12.1
12.1.1
12.1.2
12.2
12.2.1
12.2.2
12.2.3
Contents
13.
13.1
13.1.1
13.1.2
13.2
13.2.1
13.2.2
13.3
14.
14.1
14.1.1
14.1.2
14.1.3
A. Proof Script Fragments for
A.I Reliability
A.
A.3 Session-key Confidentiality
B. Proof Script Fragments for
B.I Unicity
B.2 Unicity Relying on Tiniest amps
B.3 Key Distribution and Non-injcctive Agreement
C. Proof Script Fragments for Shoup-Rubin
C.I Function "initState"
C.2 Function "knows"'
C.3 Authentication
D. Proof Script Fragments for Zhou-Gollmann
D.I Validity of Alain Evidence
D.2 Validity of Subsidiary Evidence
D.3 Fairness
Bibliography |
adam_txt |
Contents
1.
1.1 Motivation . 4
1.1.1
1.1.2
1.1.3
1.2
1.2.1
1.2.2
1.2.3
1.3
1.3.1
1.3.2
1.3.3
1.4
2.
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.2
2.2.1
2.2.2
2.2.3
2.2.4
3.
3.1
3.2
3.3
XII Contents
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
4.
4.1
4.2
4.3
4.4
4.5
4.6
4.7
5.
5.1
5.2
5.3
5.4
6.
6.1
6.2
6.3
6.4
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.5.6
6.5.7
6.6
7.
7.1
7.1.1
7.1.2
7.2
7.2.1
Contents
7.2.2
7.2.3
7.2.4
7.2.5
7.3
7.3.1
7.3.2
7.3.3
7.3.4
7.3.5
7.3.6
7.3.7
8.
8.1
8.1.1
8.1.2
8.2
8.2.1
8.2.2
8.2.3
8.2.4
8.2.5
8.3
8.3.1
8.3.2
8.4
8.4.1
8.4.2
8.5
8.5.1
8.5.2
8.6
8.6.1
8.6.2
9.
9.1
9.2
9.3
9.3.1
9.3.2
9.3.3
XIV Contents
10.
10.1
10.1.1
10.1.2
10.1.3
10.2
10.3
10.4
10.5
11.
11.1
11.2
11.2.1
11.2.2
11.2.3
11.2.4
11.2.5
11.2.6
11.2.7
11.2.8
11.2.9
11.2.10
11.3
11.3.1
11.3.2
11.3.3
11.3.4
11.3.5
11.3.6
11.3.7
11.4
12.
12.1
12.1.1
12.1.2
12.2
12.2.1
12.2.2
12.2.3
Contents
13.
13.1
13.1.1
13.1.2
13.2
13.2.1
13.2.2
13.3
14.
14.1
14.1.1
14.1.2
14.1.3
A. Proof Script Fragments for
A.I Reliability
A.
A.3 Session-key Confidentiality
B. Proof Script Fragments for
B.I Unicity
B.2 Unicity Relying on Tiniest amps
B.3 Key Distribution and Non-injcctive Agreement
C. Proof Script Fragments for Shoup-Rubin
C.I Function "initState"
C.2 Function "knows"'
C.3 Authentication
D. Proof Script Fragments for Zhou-Gollmann
D.I Validity of Alain Evidence
D.2 Validity of Subsidiary Evidence
D.3 Fairness
Bibliography |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Bella, Giampaolo |
author_facet | Bella, Giampaolo |
author_role | aut |
author_sort | Bella, Giampaolo |
author_variant | g b gb |
building | Verbundindex |
bvnumber | BV022311363 |
classification_rvk | ST 276 ST 277 |
ctrlnum | (OCoLC)180970802 (DE-599)BVBBV022311363 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV022311363</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150421</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070314s2007 gw d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,N49,0748</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">98192851X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540681342</subfield><subfield code="c">Gb. : EUR 64.15 (freier Pr.), sfr 106.00 (freier Pr.)</subfield><subfield code="9">978-3-540-68134-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540681345</subfield><subfield code="c">Gb. : EUR 64.15 (freier Pr.), sfr 106.00 (freier Pr.)</subfield><subfield code="9">3-540-68134-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642087820</subfield><subfield code="9">978-3-642-08782-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540681342</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11818311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)180970802</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022311363</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">510</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bella, Giampaolo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Formal correctness of security protocols</subfield><subfield code="b">4 Tab.</subfield><subfield code="c">Giampaolo Bella</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 274 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Induktionsbeweis</subfield><subfield code="0">(DE-588)4222014-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatisches Beweisverfahren</subfield><subfield code="0">(DE-588)4069034-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Induktionsbeweis</subfield><subfield code="0">(DE-588)4222014-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Automatisches Beweisverfahren</subfield><subfield code="0">(DE-588)4069034-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2874175&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Augsburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015520913&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015520913</subfield></datafield></record></collection> |
id | DE-604.BV022311363 |
illustrated | Illustrated |
index_date | 2024-07-02T16:58:31Z |
indexdate | 2024-07-20T09:13:35Z |
institution | BVB |
isbn | 9783540681342 3540681345 9783642087820 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015520913 |
oclc_num | 180970802 |
open_access_boolean | |
owner | DE-384 DE-824 DE-703 DE-20 DE-634 DE-83 DE-11 DE-573 |
owner_facet | DE-384 DE-824 DE-703 DE-20 DE-634 DE-83 DE-11 DE-573 |
physical | XVIII, 274 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Springer |
record_format | marc |
series2 | Information Security and Cryptography |
spelling | Bella, Giampaolo Verfasser aut Formal correctness of security protocols 4 Tab. Giampaolo Bella Berlin u.a. Springer 2007 XVIII, 274 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Information Security and Cryptography Formale Methode (DE-588)4333722-3 gnd rswk-swf Induktionsbeweis (DE-588)4222014-2 gnd rswk-swf Automatisches Beweisverfahren (DE-588)4069034-9 gnd rswk-swf Verifikation (DE-588)4135577-5 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 s Verifikation (DE-588)4135577-5 s Formale Methode (DE-588)4333722-3 s Induktionsbeweis (DE-588)4222014-2 s Automatisches Beweisverfahren (DE-588)4069034-9 s DE-604 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=2874175&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UB Augsburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015520913&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Bella, Giampaolo Formal correctness of security protocols 4 Tab. Formale Methode (DE-588)4333722-3 gnd Induktionsbeweis (DE-588)4222014-2 gnd Automatisches Beweisverfahren (DE-588)4069034-9 gnd Verifikation (DE-588)4135577-5 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4222014-2 (DE-588)4069034-9 (DE-588)4135577-5 (DE-588)4709127-7 |
title | Formal correctness of security protocols 4 Tab. |
title_auth | Formal correctness of security protocols 4 Tab. |
title_exact_search | Formal correctness of security protocols 4 Tab. |
title_exact_search_txtP | Formal correctness of security protocols 4 Tab. |
title_full | Formal correctness of security protocols 4 Tab. Giampaolo Bella |
title_fullStr | Formal correctness of security protocols 4 Tab. Giampaolo Bella |
title_full_unstemmed | Formal correctness of security protocols 4 Tab. Giampaolo Bella |
title_short | Formal correctness of security protocols |
title_sort | formal correctness of security protocols 4 tab |
title_sub | 4 Tab. |
topic | Formale Methode (DE-588)4333722-3 gnd Induktionsbeweis (DE-588)4222014-2 gnd Automatisches Beweisverfahren (DE-588)4069034-9 gnd Verifikation (DE-588)4135577-5 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Formale Methode Induktionsbeweis Automatisches Beweisverfahren Verifikation Sicherheitsprotokoll |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2874175&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015520913&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bellagiampaolo formalcorrectnessofsecurityprotocols4tab |