Formal models and techniques for analyzing security protocols:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Da Washington, DC
IOS Press
2011
|
Schriftenreihe: | Cryptology and information security series
v. 5 |
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (vii, 303 pages) illustrations |
ISBN: | 9781607507147 1607507145 1607507137 9781607507130 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045349408 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781607507147 |9 978-1-60750-714-7 | ||
020 | |a 1607507145 |9 1-60750-714-5 | ||
020 | |a 1607507137 |9 1-60750-713-7 | ||
020 | |a 9781607507130 |9 978-1-60750-713-0 | ||
035 | |a (ZDB-4-ITC)ocn758834764 | ||
035 | |a (OCoLC)758834764 | ||
035 | |a (DE-599)BVBBV045349408 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Formal models and techniques for analyzing security protocols |c edited by Veronique Cortier and Steve Kremer |
264 | 1 | |a Amsterdam ; Da Washington, DC |b IOS Press |c 2011 | |
300 | |a 1 online resource (vii, 303 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v. 5 | |
500 | |a Print version record | ||
505 | 8 | |a Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Electronic information resources / Access control |2 fast | |
650 | 4 | |a Computer security |a Computers |x Access control |a Computer networks |x Security measures |a Electronic information resources |x Access control | |
700 | 1 | |a Cortier, Veronique |e Sonstige |4 oth | |
700 | 1 | |a Kremer, Steve |e Sonstige |4 oth | |
710 | 2 | |a IOS Press |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Formal models and techniques for analyzing security protocols |d Amsterdam ; da Washington, DC : IOS Press, 2011 |z 9781607507130 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736062 |
Datensatz im Suchindex
_version_ | 1804179173282938880 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045349408 |
collection | ZDB-4-ITC |
contents | Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro |
ctrlnum | (ZDB-4-ITC)ocn758834764 (OCoLC)758834764 (DE-599)BVBBV045349408 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02548nmm a2200481zcb4500</leader><controlfield tag="001">BV045349408</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507147</subfield><subfield code="9">978-1-60750-714-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507145</subfield><subfield code="9">1-60750-714-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507137</subfield><subfield code="9">1-60750-713-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507130</subfield><subfield code="9">978-1-60750-713-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn758834764</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)758834764</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349408</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Formal models and techniques for analyzing security protocols</subfield><subfield code="c">edited by Veronique Cortier and Steve Kremer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Da Washington, DC</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (vii, 303 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 5</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic information resources / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cortier, Veronique</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kremer, Steve</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Formal models and techniques for analyzing security protocols</subfield><subfield code="d">Amsterdam ; da Washington, DC : IOS Press, 2011</subfield><subfield code="z">9781607507130</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736062</subfield></datafield></record></collection> |
id | DE-604.BV045349408 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781607507147 1607507145 1607507137 9781607507130 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736062 |
oclc_num | 758834764 |
open_access_boolean | |
physical | 1 online resource (vii, 303 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | Formal models and techniques for analyzing security protocols edited by Veronique Cortier and Steve Kremer Amsterdam ; Da Washington, DC IOS Press 2011 1 online resource (vii, 303 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v. 5 Print version record Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computers / Access control fast Electronic information resources / Access control fast Computer security Computers Access control Computer networks Security measures Electronic information resources Access control Cortier, Veronique Sonstige oth Kremer, Steve Sonstige oth IOS Press Sonstige oth Erscheint auch als Druck-Ausgabe Formal models and techniques for analyzing security protocols Amsterdam ; da Washington, DC : IOS Press, 2011 9781607507130 |
spellingShingle | Formal models and techniques for analyzing security protocols Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computers / Access control fast Electronic information resources / Access control fast Computer security Computers Access control Computer networks Security measures Electronic information resources Access control |
title | Formal models and techniques for analyzing security protocols |
title_auth | Formal models and techniques for analyzing security protocols |
title_exact_search | Formal models and techniques for analyzing security protocols |
title_full | Formal models and techniques for analyzing security protocols edited by Veronique Cortier and Steve Kremer |
title_fullStr | Formal models and techniques for analyzing security protocols edited by Veronique Cortier and Steve Kremer |
title_full_unstemmed | Formal models and techniques for analyzing security protocols edited by Veronique Cortier and Steve Kremer |
title_short | Formal models and techniques for analyzing security protocols |
title_sort | formal models and techniques for analyzing security protocols |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computers / Access control fast Electronic information resources / Access control fast Computer security Computers Access control Computer networks Security measures Electronic information resources Access control |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computers / Access control Electronic information resources / Access control Computer security Computers Access control Computer networks Security measures Electronic information resources Access control |
work_keys_str_mv | AT cortierveronique formalmodelsandtechniquesforanalyzingsecurityprotocols AT kremersteve formalmodelsandtechniquesforanalyzingsecurityprotocols AT iospress formalmodelsandtechniquesforanalyzingsecurityprotocols |