Formal models and techniques for analyzing security protocols /:
Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Da Washington, DC :
IOS Press,
©2011.
|
Schriftenreihe: | Cryptology and information security series ;
v. 5. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro. |
Beschreibung: | 1 online resource (vii, 303 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781607507147 1607507145 1607507137 9781607507130 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn758834764 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 111027s2011 ne a ob 001 0 eng d | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d N$T |d YDXCP |d E7B |d CDX |d OCLCQ |d DEBSZ |d OCLCQ |d NLGGC |d EBLCP |d IDEBK |d CEF |d OCLCQ |d OCLCO |d OCLCF |d S3O |d OCLCQ |d AGLDB |d ZCU |d OCLCQ |d MERUC |d OCLCQ |d U3W |d OCLCA |d VTS |d ICG |d OCLCQ |d INT |d VT2 |d AU@ |d OCLCQ |d WYU |d JBG |d OCLCQ |d STF |d DKC |d OCLCQ |d M8D |d OCLCQ |d AJS |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 756484738 |a 1055385008 |a 1058000563 |a 1066430311 |a 1081185947 |a 1228530613 | ||
020 | |a 9781607507147 |q (electronic bk.) | ||
020 | |a 1607507145 |q (electronic bk.) | ||
020 | |a 1607507137 | ||
020 | |a 9781607507130 | ||
020 | |z 9781607507130 |q (hardcover) | ||
035 | |a (OCoLC)758834764 |z (OCoLC)756484738 |z (OCoLC)1055385008 |z (OCoLC)1058000563 |z (OCoLC)1066430311 |z (OCoLC)1081185947 |z (OCoLC)1228530613 | ||
037 | |a 978-1-60750-714-7 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a QA76.9.A25 |b F654 2011 | |
072 | 7 | |a COM053000 |x COM |2 bisacsh | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Formal models and techniques for analyzing security protocols / |c edited by Véronique Cortier and Steve Kremer. |
260 | |a Amsterdam ; |a Da Washington, DC : |b IOS Press, |c ©2011. | ||
300 | |a 1 online resource (vii, 303 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series ; |v v. 5 | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index. | |
520 | |a Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Electronic information resources |x Access control. |0 http://id.loc.gov/authorities/subjects/sh99010373 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sources d'information électroniques |x Accès |x Contrôle. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
650 | 7 | |a Electronic information resources |x Access control |2 fast | |
700 | 1 | |a Cortier, Véronique. | |
700 | 1 | |a Kremer, Steve. | |
710 | 2 | |a IOS Press. | |
758 | |i has work: |a Formal models and techniques for analyzing security protocols (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFC8HHcqTCHpPqf4wbHcj3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Formal models and techniques for analyzing security protocols. |d Amsterdam ; da Washington, DC : IOS Press, ©2011 |z 9781607507130 |w (OCoLC)705518947 |
830 | 0 | |a Cryptology and information security series ; |v v. 5. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395231 |3 Volltext |
938 | |a Coutts Information Services |b COUT |n 19558387 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL784604 | ||
938 | |a ebrary |b EBRY |n ebr10506344 | ||
938 | |a EBSCOhost |b EBSC |n 395231 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 328961 | ||
938 | |a YBP Library Services |b YANK |n 3639903 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn758834764 |
---|---|
_version_ | 1816881774264844288 |
adam_text | |
any_adam_object | |
author2 | Cortier, Véronique Kremer, Steve |
author2_role | |
author2_variant | v c vc s k sk |
author_corporate | IOS Press |
author_corporate_role | |
author_facet | Cortier, Véronique Kremer, Steve IOS Press |
author_sort | Cortier, Véronique |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 F654 2011 |
callnumber-search | QA76.9.A25 F654 2011 |
callnumber-sort | QA 276.9 A25 F654 42011 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index. |
ctrlnum | (OCoLC)758834764 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04926cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn758834764</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111027s2011 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">CDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">S3O</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">756484738</subfield><subfield code="a">1055385008</subfield><subfield code="a">1058000563</subfield><subfield code="a">1066430311</subfield><subfield code="a">1081185947</subfield><subfield code="a">1228530613</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507147</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507145</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507137</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507130</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781607507130</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)758834764</subfield><subfield code="z">(OCoLC)756484738</subfield><subfield code="z">(OCoLC)1055385008</subfield><subfield code="z">(OCoLC)1058000563</subfield><subfield code="z">(OCoLC)1066430311</subfield><subfield code="z">(OCoLC)1081185947</subfield><subfield code="z">(OCoLC)1228530613</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-60750-714-7</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">F654 2011</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="x">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Formal models and techniques for analyzing security protocols /</subfield><subfield code="c">edited by Véronique Cortier and Steve Kremer.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Da Washington, DC :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (vii, 303 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 5</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99010373</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sources d'information électroniques</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cortier, Véronique.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kremer, Steve.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Formal models and techniques for analyzing security protocols (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFC8HHcqTCHpPqf4wbHcj3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Formal models and techniques for analyzing security protocols.</subfield><subfield code="d">Amsterdam ; da Washington, DC : IOS Press, ©2011</subfield><subfield code="z">9781607507130</subfield><subfield code="w">(OCoLC)705518947</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 5.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395231</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">19558387</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL784604</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10506344</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">395231</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">328961</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3639903</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn758834764 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:18:03Z |
institution | BVB |
isbn | 9781607507147 1607507145 1607507137 9781607507130 |
language | English |
oclc_num | 758834764 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (vii, 303 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press, |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and information security series ; |
spelling | Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer. Amsterdam ; Da Washington, DC : IOS Press, ©2011. 1 online resource (vii, 303 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptology and information security series ; v. 5 Includes bibliographical references and index. Print version record. Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index. Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro. Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Electronic information resources Access control. http://id.loc.gov/authorities/subjects/sh99010373 Sécurité informatique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Sources d'information électroniques Accès Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Computers Access control fast Electronic information resources Access control fast Cortier, Véronique. Kremer, Steve. IOS Press. has work: Formal models and techniques for analyzing security protocols (Text) https://id.oclc.org/worldcat/entity/E39PCFC8HHcqTCHpPqf4wbHcj3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Formal models and techniques for analyzing security protocols. Amsterdam ; da Washington, DC : IOS Press, ©2011 9781607507130 (OCoLC)705518947 Cryptology and information security series ; v. 5. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395231 Volltext |
spellingShingle | Formal models and techniques for analyzing security protocols / Cryptology and information security series ; Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index. Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Electronic information resources Access control. http://id.loc.gov/authorities/subjects/sh99010373 Sécurité informatique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Sources d'information électroniques Accès Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Computers Access control fast Electronic information resources Access control fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029553 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh99010373 |
title | Formal models and techniques for analyzing security protocols / |
title_auth | Formal models and techniques for analyzing security protocols / |
title_exact_search | Formal models and techniques for analyzing security protocols / |
title_full | Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer. |
title_fullStr | Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer. |
title_full_unstemmed | Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer. |
title_short | Formal models and techniques for analyzing security protocols / |
title_sort | formal models and techniques for analyzing security protocols |
topic | Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Electronic information resources Access control. http://id.loc.gov/authorities/subjects/sh99010373 Sécurité informatique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Sources d'information électroniques Accès Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Computers Access control fast Electronic information resources Access control fast |
topic_facet | Computer security. Computers Access control. Computer networks Security measures. Electronic information resources Access control. Sécurité informatique. Ordinateurs Accès Contrôle. Réseaux d'ordinateurs Sécurité Mesures. Sources d'information électroniques Accès Contrôle. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Computers Access control Electronic information resources Access control |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395231 |
work_keys_str_mv | AT cortierveronique formalmodelsandtechniquesforanalyzingsecurityprotocols AT kremersteve formalmodelsandtechniquesforanalyzingsecurityprotocols AT iospress formalmodelsandtechniquesforanalyzingsecurityprotocols |