Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows

Afbeeldingen

Artikel vergelijken

  • Engels
  • Paperback
  • 9783030190514
  • 28 april 2019
  • 239 pagina's
Alle productspecificaties

Samenvatting

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.

Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributionsauthored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.



This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.

Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributionsauthored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.

Productspecificaties

Inhoud

Taal
en
Bindwijze
Paperback
Oorspronkelijke releasedatum
28 april 2019
Aantal pagina's
239
Illustraties
Nee

Betrokkenen

Hoofdauteur
Guttman, Joshua D.
Hoofdredacteur
Joshua D. Guttman
Tweede Redacteur
Carl E. Landwehr
Co Redacteur
Dusko Pavlovic

Overige kenmerken

Editie
1st ed. 2019
Extra groot lettertype
Nee
Product breedte
155 mm
Product lengte
235 mm
Studieboek
Nee
Verpakking breedte
155 mm
Verpakking hoogte
235 mm
Verpakking lengte
235 mm
Verpakkingsgewicht
454 g

EAN

EAN
9783030190514
Nog geen reviews

Kies gewenste uitvoering

Bindwijze : Paperback

Prijsinformatie en bestellen

De prijs van dit product is 57 euro en 99 cent.
2 - 3 weken
Verkoop door bol
In winkelwagen
  • Prijs inclusief verzendkosten, verstuurd door bol
  • Ophalen bij een bol afhaalpunt mogelijk
  • 30 dagen bedenktijd en gratis retourneren
  • Dag en nacht klantenservice

Lijst met gekozen artikelen om te vergelijken

Vergelijk artikelen