Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture Notes in Computer Science
5511 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | X, 221 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 9783642034589 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035724406 | ||
003 | DE-604 | ||
005 | 20101207 | ||
007 | t| | ||
008 | 090915s2009 xx d||| |||| 10||| eng d | ||
015 | |a 09,N31,0018 |2 dnb | ||
016 | 7 | |a 995338558 |2 DE-101 | |
020 | |a 9783642034589 |c PB. : EUR 45.96 (freier Pr.), sfr 67.00 (freier Pr.) |9 978-3-642-03458-9 | ||
024 | 3 | |a 9783642034589 | |
028 | 5 | 2 | |a 12725595 |
035 | |a (OCoLC)428028158 | ||
035 | |a (DE-599)DNB995338558 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Foundations and Applications of Security Analysis |b Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers |c Pierpaolo Degano ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a X, 221 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5511 | |
650 | 4 | |a Computersicherheit - Kongress - York <2009> | |
650 | 4 | |a Kryptoanalyse - Kongress - York <2009> | |
650 | 4 | |a Rechnernetz - API - Computersicherheit - Datensicherung - Kongress - York <2009> | |
650 | 4 | |a Schlüsselverwaltung - Kongress - York <2009> | |
650 | 4 | |a Sicherheitsprotokoll - Kongress - York <2009> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 4 | |a Formal methods (Computer science) |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a API |0 (DE-588)4430243-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z York |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 4 | 1 | |a API |0 (DE-588)4430243-5 |D s |
689 | 4 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 4 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Degano, Pierpaolo |d 1950- |e Sonstige |0 (DE-588)115394869 |4 oth | |
711 | 2 | |a Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security |d 2009 |c York |j Sonstige |0 (DE-588)16024176-5 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 5511 |w (DE-604)BV000000607 |9 5511 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001121&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018001121 |
Datensatz im Suchindex
_version_ | 1820875171827810304 |
---|---|
adam_text |
TABLE OF CONTENTS A POLICY MODEL FOR SECURE INFORMATION FLOW 1 ADEDAYO
O. ADETOYE AND ATTA BADII A GENERAL FRAMEWORK FOR NONDETERMINISTIC,
PROBABILISTIC, AND STOCHASTIC NONINTERFERENCE 18 ALESSANDRO ALDINI AND
MARCO BERNARDO VALIDATING SECURITY PROTOCOLS UNDER THE GENERAL ATTACKER
34 WIHEM ARSAC, GIAMPAOLO BELLA, XAVIER CHANTRY, AND LUCA COMPAGNA USAGE
AUTOMATA 52 MASSIMO BARTOLETTI STATIC DETECTION OF LOGIC FLAWS IN
SERVICE-ORIENTED APPLICATIONS 70 CHIARA BODEI, LINDA BRODO, AND ROBERTO
BRUNI IMPROVING THE SEMANTICS OF IMPERFECT SECURITY 88 NIKLAS BROBERG
AND DAVID SANDS ANALYSING PKCS#11 KEY MANAGEMENT APIS WITH UNBOUNDED
FRESH DATA 92 SIBYLLE FROESCHLE AND GRAHAM STEEL TRANSFORMATIONS BETWEEN
CRYPTOGRAPHIC PROTOCOLS 107 JOSHUA D. GUTTMAN FORMAL VALIDATION OF
OFEPSP+ WITH AVISPA 124 JORGE L. HERNANDEZ-ARDIETA, ANA I.
GONZALEZ-TABLAS, AND BENJAMIN RAMOS ON THE AUTOMATED CORRECTION OF
PROTOCOLS WITH IMPROPER MESSAGE ENCODING 138 DIETER BUTTER AND RAUL
MONROY FINITE MODELS IN FOL-BASED CRYPTO-PROTOCOL VERIFICATION 155 JAN
JUERJENS AND TJARK WEBER TOWARDS A TYPE SYSTEM FOR SECURITY APIS 173
GAVIN KEIGHREN, DAVID ASPINALL, AND GRAHAM STEEL SEPARATIN
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/995338558 DIGITALISIERT
DURCH X TABLE OF CONTENTS HOW MANY ELECTION OFFICIALS DOES IT TAKE TO
CHANGE AN ELECTION? 211 P.Y.A. RYAN AUTHOR INDEX 223 |
any_adam_object | 1 |
author_GND | (DE-588)115394869 |
building | Verbundindex |
bvnumber | BV035724406 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)428028158 (DE-599)DNB995338558 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035724406</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101207</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090915s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N31,0018</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">995338558</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642034589</subfield><subfield code="c">PB. : EUR 45.96 (freier Pr.), sfr 67.00 (freier Pr.)</subfield><subfield code="9">978-3-642-03458-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642034589</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12725595</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)428028158</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB995338558</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations and Applications of Security Analysis</subfield><subfield code="b">Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers</subfield><subfield code="c">Pierpaolo Degano ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 221 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5511</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Kongress - York <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - York <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - API - Computersicherheit - Datensicherung - Kongress - York <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Schlüsselverwaltung - Kongress - York <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitsprotokoll - Kongress - York <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Formal methods (Computer science)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">API</subfield><subfield code="0">(DE-588)4430243-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">York</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">API</subfield><subfield code="0">(DE-588)4430243-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Degano, Pierpaolo</subfield><subfield code="d">1950-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)115394869</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security</subfield><subfield code="d">2009</subfield><subfield code="c">York</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16024176-5</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5511</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5511</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001121&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018001121</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 York gnd-content |
genre_facet | Konferenzschrift 2009 York |
id | DE-604.BV035724406 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:22Z |
institution | BVB |
institution_GND | (DE-588)16024176-5 |
isbn | 9783642034589 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018001121 |
oclc_num | 428028158 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | X, 221 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers Pierpaolo Degano ... (eds.) Berlin [u.a.] Springer 2009 X, 221 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 5511 Computersicherheit - Kongress - York <2009> Kryptoanalyse - Kongress - York <2009> Rechnernetz - API - Computersicherheit - Datensicherung - Kongress - York <2009> Schlüsselverwaltung - Kongress - York <2009> Sicherheitsprotokoll - Kongress - York <2009> Computer security Congresses Cryptography Congresses Formal methods (Computer science) Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf API (DE-588)4430243-5 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 York gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Sicherheitsprotokoll (DE-588)4709127-7 s Kryptoanalyse (DE-588)4830502-9 s Schlüsselverwaltung (DE-588)4625230-7 s Rechnernetz (DE-588)4070085-9 s API (DE-588)4430243-5 s Datensicherung (DE-588)4011144-1 s Degano, Pierpaolo 1950- Sonstige (DE-588)115394869 oth Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 2009 York Sonstige (DE-588)16024176-5 oth Lecture Notes in Computer Science 5511 (DE-604)BV000000607 5511 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001121&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers Lecture Notes in Computer Science Computersicherheit - Kongress - York <2009> Kryptoanalyse - Kongress - York <2009> Rechnernetz - API - Computersicherheit - Datensicherung - Kongress - York <2009> Schlüsselverwaltung - Kongress - York <2009> Sicherheitsprotokoll - Kongress - York <2009> Computer security Congresses Cryptography Congresses Formal methods (Computer science) Congresses Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd API (DE-588)4430243-5 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4430243-5 (DE-588)4625230-7 (DE-588)4709127-7 (DE-588)1071861417 |
title | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers |
title_auth | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers |
title_exact_search | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers |
title_full | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers Pierpaolo Degano ... (eds.) |
title_fullStr | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers Pierpaolo Degano ... (eds.) |
title_full_unstemmed | Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers Pierpaolo Degano ... (eds.) |
title_short | Foundations and Applications of Security Analysis |
title_sort | foundations and applications of security analysis joint workshop on automated reasoning for security protocol analysis and issues in the theory of security arspa wits 2009 york uk march 28 29 2009 revised selected papers |
title_sub | Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers |
topic | Computersicherheit - Kongress - York <2009> Kryptoanalyse - Kongress - York <2009> Rechnernetz - API - Computersicherheit - Datensicherung - Kongress - York <2009> Schlüsselverwaltung - Kongress - York <2009> Sicherheitsprotokoll - Kongress - York <2009> Computer security Congresses Cryptography Congresses Formal methods (Computer science) Congresses Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd API (DE-588)4430243-5 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computersicherheit - Kongress - York <2009> Kryptoanalyse - Kongress - York <2009> Rechnernetz - API - Computersicherheit - Datensicherung - Kongress - York <2009> Schlüsselverwaltung - Kongress - York <2009> Sicherheitsprotokoll - Kongress - York <2009> Computer security Congresses Cryptography Congresses Formal methods (Computer science) Congresses Datensicherung Rechnernetz Kryptoanalyse Computersicherheit API Schlüsselverwaltung Sicherheitsprotokoll Konferenzschrift 2009 York |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001121&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT deganopierpaolo foundationsandapplicationsofsecurityanalysisjointworkshoponautomatedreasoningforsecurityprotocolanalysisandissuesinthetheoryofsecurityarspawits2009yorkukmarch28292009revisedselectedpapers AT jointworkshoponautomatedreasoningforsecurityprotocolanalysisandissuesinthetheoryofsecurityyork foundationsandapplicationsofsecurityanalysisjointworkshoponautomatedreasoningforsecurityprotocolanalysisandissuesinthetheoryofsecurityarspawits2009yorkukmarch28292009revisedselectedpapers |