• الرئیسیة
  • البحث المتقدم
  • قائمة المکتبات
  • حول الموقع
  • اتصل بنا
  • نشأة

عنوان
Principles of security and trust :

پدید آورنده
David Basin, John C. Mitchell (eds.).

موضوع
Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.

رده
QA76
.
9
.
A25
D385
2013

کتابخانه
کتابخانه مطالعات اسلامی به زبان های اروپایی

محل استقرار
استان: قم ـ شهر: قم

کتابخانه مطالعات اسلامی به زبان های اروپایی

تماس با کتابخانه : 32910706-025

3642368298
9783642368295

b567830

Principles of security and trust :
[Book]
second international conference, POST 2013, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013 : proceedings
David Basin, John C. Mitchell (eds.).

Berlin ; New York
Springer
©2013.

xx, 286 pages : illustrations ; 24 cm.

Lecture notes in computer science, 7796.; Lecture notes in computer science., Advanced research in computing and software science.; LNCS sublibrary., SL 4,, Security and cryptology.

International conference proceedings.

Regular Papers --; Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks / Rémy Chrétien, Stéphanie Delaune --; Practical Everlasting Privacy / Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan --; A Differentially Private Mechanism of Optimal Utility for a Region of Priors / Ehab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi --; Proved Generation of Implementations from Computationally Secure Protocol Specifications / David Cadé, Bruno Blanchet --; Sound Security Protocol Transformations / Binh Thanh Nguyen, Christoph Sprenger. Logical Foundations of Secure Resource Management in Protocol Implementations / Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei --; Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage / Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis --; Lazy Mobile Intruders / Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson --; On Layout Randomization for Arrays and Functions / Martín Abadi, Jérémy Planul --; A Theory of Agreements and Protection / Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino. Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification / Michael Backes, Fabian Bendun, Dominique Unruh --; Proving More Observational Equivalences with ProVerif / Vincent Cheval, Bruno Blanchet --; Formal Verification of e-Auction Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech --; Sessions and Separability in Security Protocols / Marco Carbone, Joshua D. Guttman.

POST 2013; ETAPS 2013

Computer networks -- Security measures -- Congresses.
Computer security -- Congresses.
Data encryption (Computer science) -- Congresses.

QA76
.
9
.
A25
D385
2013

David Basin, John C. Mitchell (eds.).

David Basin
John C Mitchell

 مطالعه متن کتاب 

[Book]

Y

الاقتراح / اعلان الخلل

تحذیر! دقق في تسجیل المعلومات
ارسال عودة
تتم إدارة هذا الموقع عبر مؤسسة دار الحديث العلمية - الثقافية ومركز البحوث الكمبيوترية للعلوم الإسلامية (نور)
المكتبات هي المسؤولة عن صحة المعلومات كما أن الحقوق المعنوية للمعلومات متعلقة بها
برترین جستجوگر - پنجمین جشنواره رسانه های دیجیتال